Experimental Study of a Network Access Server for a public WLAN access network

Wireless access networks have gained popularity due to the flexibility they allow the user, who is able to move away from his or her desk while still being able to access information. Among the dif ...

[1]  Hilarie K. Orman,et al.  The OAKLEY Key Determination Protocol , 1997, RFC.

[2]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[3]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[4]  Jari Arkko,et al.  DIAMETER Accounting Extension , 2001 .

[5]  Jamie Jaworski,et al.  Java Security Handbook , 2000 .

[6]  Krishna Narayanaswamy Radius Security Extensions using Kerberos v5 , 2001 .

[7]  William A. Arbaugh,et al.  YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .

[8]  William Dixon IPsec over NAT Justification for UDP Encapsulation , 2001 .

[9]  Mary Baker,et al.  Flexible Network Support for Mobile Hosts , 2001, Mob. Networks Appl..

[10]  Victor Fajardo,et al.  Diameter Base Protocol , 2003, RFC.

[11]  William Allen Simpson,et al.  PPP Challenge Handshake Authentication Protocol (CHAP) , 1996, RFC.

[12]  Wei Wang,et al.  Review of Roaming Implementations , 1997, RFC.

[13]  Dan Harkins,et al.  The Internet Key Exchange (IKE) , 1998, RFC.

[14]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.

[15]  Tony Mancill Linux Routers: A Primer For Network Administrators , 2000 .

[16]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[17]  Ralph E. Droms,et al.  Authentication for DHCP Messages , 2001, RFC.

[18]  Craig A. Finseth,et al.  An Access Control Protocol, Sometimes Called TACACS , 1993, RFC.

[19]  Johan Ervenius,et al.  Dual-mode Capability in a WLAN-equipped PC for Roaming and Mobility between WLANs and GPRS Networks , 2001 .

[20]  Randall J. Atkinson,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[21]  Ieee . Wg Part11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Higher-Speed Physical Layer Extension in the 2.4 GHz Band , 1999 .

[22]  Charles E. Perkins,et al.  AAA Registration Keys for Mobile IP , 1999 .

[23]  G. Brasche,et al.  Concepts, services, and protocols of the new GSM phase 2+ general packet radio service : Wireless networks , 1997 .

[24]  Charles E. Perkins,et al.  Mobile IP Authentication, Authorization, and Accounting Requirements , 2000, RFC.

[25]  Bernard Aboba,et al.  IPSEC-NAT Compatibility Requirements , 2001 .

[26]  Perry Metzger,et al.  IP Authentication using Keyed SHA1 with Interleaved Padding (IP-MAC) , 2000, RFC.

[27]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[28]  Marika Mattila Secure Communication in Mobile Internet , 2001 .

[29]  Charles E. Perkins,et al.  Mobile IP Network Access Identifier Extension for IPv4 , 2000, RFC.

[30]  Gerald Q. Maguire,et al.  The Effect of Using Co-Located Care-of Addresses on Macro Handover Latency , 1998 .

[31]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[32]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[33]  Guido Appenzeller,et al.  User-friendly access control for public network ports , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[34]  Indra Widjaja,et al.  IEEE 802.11 Wireless Local Area Networks , 1997, IEEE Commun. Mag..

[35]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[36]  Charles E. Perkins,et al.  Mobile IPv4 Challenge/Response Extensions , 2000, RFC.

[37]  Henrik Levkowetz,et al.  NAT Traversal for Mobile IP using UDP Tunnelling , 2001 .

[38]  Henrik Levkowetz,et al.  Mobile IP NAT/NAPT Traversal using UDP Tunnelling , 2001 .

[39]  David Mitton,et al.  Authentication, Authorization, and Accounting: Protocol Evaluation , 2001, RFC.

[40]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[41]  Thomas Wu,et al.  The SRP Authentication and Key Exchange System , 2000, RFC.

[42]  Barbara Fraser,et al.  Site Security Handbook , 1997, RFC.

[43]  Naganand Doraswamy,et al.  IP Security Document Roadmap , 1998, RFC.

[44]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[45]  W. Douglas Maughan,et al.  Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.

[46]  T. Dierks,et al.  The TLS protocol , 1999 .

[47]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[48]  David Mitton,et al.  Criteria for Evaluating Network Access Server Protocols , 2001, RFC.

[49]  Charles E. Perkins,et al.  IP Mobility Support , 1996, RFC.

[50]  Sami Vaarala Mobile IP NAT/NAPT/Firewall Traversal , 2001 .

[51]  Yves T'Joens,et al.  DHCP reconfigure extension , 2001, RFC.

[52]  Jesse Walker,et al.  Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .

[53]  Glen Zorn,et al.  DIAMETER Framework Document , 2001 .

[54]  Ralph E. Droms,et al.  Dynamic Host Configuration Protocol , 1993, RFC.

[55]  Charles E. Perkins,et al.  IP Mobility Support for IPv4 , 2002, RFC.

[56]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[57]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[58]  Charles E. Perkins,et al.  Generalized Key Distribution Extensions for Mobile IP , 2001 .

[59]  Pat R. Calhoun,et al.  RADIUS Extensions , 2000, RFC.

[60]  Carl Rigney,et al.  RADIUS Accounting , 1997, RFC.

[61]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[62]  Yakov Rekhter,et al.  Address Allocation for Private Internets , 1994, RFC.

[63]  M. Johnsson HiperLAN/2-The Broadband Radio Transmission Technology Operating in the 5 GHz Frequency Band , 1999 .

[64]  Bernard Aboba,et al.  Proxy Chaining and Policy Implementation in Roaming , 1999, RFC.

[65]  Jari Arkko,et al.  Introduction to Accounting Management , 2000, RFC.

[66]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[67]  Pyda Srisuresh,et al.  Traditional IP Network Address Translator (Traditional NAT) , 2001, RFC.

[68]  Jeffrey D. Case,et al.  Simple Network Management Protocol (SNMP) , 1989, RFC.