Introducing history-enriched security context transfer to enhance the security of subsequent handover

Ulrike Meyer, Susanne Wetzel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Many solutions for securing inter-provider handover proposed to date make use of the concept of security context transfer. However, none of these solutions addresses problems arising from subsequent handover. In this paper, we provide a formal model for subsequent security context transfer and define a set of security requirements. We furthermore present a new solution that meets all but one of these requirements. In particular, we combine the concept of a history-enriched security context transfer with a policy-based handover decision process.

Original languageEnglish
Title of host publicationProceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
Pages277-282
Number of pages6
DOIs
StatePublished - 2006
Event4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006 - Pisa, Italy
Duration: 13 Mar 200617 Mar 2006

Publication series

NameProceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
Volume2006

Conference

Conference4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
Country/TerritoryItaly
CityPisa
Period13/03/0617/03/06

Fingerprint

Dive into the research topics of 'Introducing history-enriched security context transfer to enhance the security of subsequent handover'. Together they form a unique fingerprint.

Cite this