K. Annan, Secretary-General of the UN Message on the Opening of World Space Week, 2000.

C. Shirky, Half the World, 2002.

I. Group, ICFA-SCIC Network Monitoring Report, International Committee for Future Accelerators (ICFA) ? Standing Committee on Inter-Regional Connectivity (SCIC), 2004.

A. Pentland, R. Fletcher, and A. Hasson, DakNet: rethinking connectivity in developing nations, Computer, vol.37, issue.1, pp.78-83, 2004.
DOI : 10.1109/MC.2004.1260729

A. S. Tanenbaum, Computer Networks, 2002.

D. Raychaudhuri, 4G Network Architectures: WLAN Hot-Spots, Infostations and beyond, IEEE PIMRC Keynote Talk, 2002.

G. E. Moore, Cramming More Components Onto Integrated Circuits, Proceedings of the IEEE, vol.86, issue.1, 1965.
DOI : 10.1109/JPROC.1998.658762

J. D. Day and H. Zimmerman, The OSI reference model, Proceedings of the IEEE, pp.1334-1340, 1983.
DOI : 10.1109/PROC.1983.12775

Q. Rahman and M. Ibnkahla, Mobile Communications: Technologies and Challenges Signal Processing for Mobile Communications Handbook, 2004.

E. Van-damme, The European UMTS-auctions, European Economic Review, vol.46, issue.4-5, pp.846-858, 2002.
DOI : 10.1016/S0014-2921(01)00219-7

]. J. Geier, Duelling with Microwave Ovens

C. Perkins and E. , IP Mobility Support for IPv4, IETF, vol.3344, 2002.

J. Rosenberg, SIP: Session Initiation Protocol, 2002.
DOI : 10.17487/rfc3261

D. Tiang and M. Baker, Analysis of a Local-Area Wireless Network, ACM MOBICOM, 2000.

A. Campbell, Comparison of IP micromobility protocols, IEEE Wireless Communications, vol.9, issue.1, pp.72-82, 2002.
DOI : 10.1109/MWC.2002.986462

S. Das, IDMP: an intradomain mobility management protocol for next-generation wireless networks, IEEE Wireless Communications, vol.9, issue.3, pp.38-45, 2002.
DOI : 10.1109/MWC.2002.1016709

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.4808

R. Ramjee, HAWAII: A Domain-Based Approach for Supporting Mobility in Wide-area Wireless Networks, Proc. IEEE Int'l. Conf. Network Protocols, 1999.

D. Silva and H. Sirisena, A Mobility Management Protocol for IP-Based Cellular Networks, IEEE Wireless Communications, pp.31-37, 2002.

B. Schneier, Applied Cryptography, 1995.

A. Kerckhoffs, La cryptographie militaire, Journal des Sciences Militaires, vol.9, p.12, 1883.

Y. Bai and H. Kobayashi, Intrusion Detection Systems: technology and development, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003., p.710, 2003.
DOI : 10.1109/AINA.2003.1192972

D. J. Gooch, S. D. Hubbard, M. W. Moore, and J. Hill, Firewalls - Evolve or Die, BT Technol J, vol.19, issue.3, pp.89-98, 2001.
DOI : 10.1049/PBBT004E_ch11

Y. Xu and H. C. Lee, A Source Address Filtering Firewall to Defend Against Denial of Service Attacks, Proc. 60th Vehicular Technology Conference, 2004.

D. Patiyoot and S. J. Shepherd, Cryptographic security Techniques for wireless networks, ACM SIGOPS Operating Systems Review, vol.33, issue.2, pp.36-50, 1999.
DOI : 10.1145/311094.311104

S. Ravi, A. Raghunathan, and N. Potlapally, Securing wireless data, Proceedings of the 15th international symposium on System Synthesis , ISSS '02, 2002.
DOI : 10.1145/581199.581243

H. Poincaré, The Foundations of Science, p.129, 1982.
DOI : 10.1017/CBO9781107252950

J. M. Pereira, Fourth generation: now, it is personal!, 11th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. PIMRC 2000. Proceedings (Cat. No.00TH8525), pp.1009-1016, 2000.
DOI : 10.1109/PIMRC.2000.881574

B. G. Evans and K. Baughan, Visions of 4G, Electronics & Communication Engineering Journal, vol.12, issue.6, pp.293-303, 2000.
DOI : 10.1049/ecej:20000608

Y. Raivio, 4G ? Hype or Reality, IEE 3G Mobile Communication Technologies, pp.346-350, 2001.

U. Varshney and R. Jain, Issues in emerging 4G wireless networks, Computer, vol.34, issue.6, pp.94-96, 2001.
DOI : 10.1109/2.953469

V. Gupta and S. Gupta, KSSL: Experiments in Wireless Internet Security, Proc. Wireless Communications and Networking Conference, pp.860-864, 2002.

L. Becchetti, F. D. Priscoli, T. Inzerillli, P. Mähönen, and L. Muñoz, Enhancing IP service provision over heterogeneous wireless networks: a path toward 4G, IEEE Communications Magazine, vol.39, issue.8, pp.74-81, 2001.
DOI : 10.1109/35.940039

W. Emmerich, Engineering Distributed Objects, 2000.
DOI : 10.1007/3-540-45254-0

J. Al-muhtadi, D. Mickunas, and R. Campbell, A lightweight reconfigurable security mechanism for 3G/4G mobile devices, IEEE Wireless Communications, vol.9, issue.2, pp.60-65, 2002.
DOI : 10.1109/MWC.2002.998526

T. Otsu, I. Okajima, N. Umeda, and Y. Yamao, Network architecture for mobile communications systems beyond IMT-2000, IEEE Personal Communications, vol.8, issue.5, pp.31-37, 2001.
DOI : 10.1109/98.960338

H. Yumiba, K. Imai, and M. Yabusaki, IP-based IMT network platform, IEEE Personal Communications, vol.8, issue.5, pp.18-23, 2001.
DOI : 10.1109/98.960336

W. Kellerer, H. Vögel, and K. Steinberg, A communication gateway for infrastructure-independent 4G wireless access, IEEE Communications Magazine, vol.40, issue.3, pp.126-131, 2002.
DOI : 10.1109/35.989771

J. Zhang, J. Li, S. Weinstein, and N. Tu, Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support, ACM SIGMOBILE Mobile Computing and Communications Review, vol.6, issue.3, pp.10-21, 2002.
DOI : 10.1145/581291.581297

D. Forsber, Y. Ohba, H. Pati, A. Tschofenig, and . Yegin, Protocol for carrying Authentication for Network Access, IETF PANA Working Group Draft, 2003.

M. Nakhjiri, C. Perkins, and R. Koodli, Context Transfer Protocol " , draft-ietf-seamoby-ctp-11.txt, approved IETF draft, work in progress, 2004.
DOI : 10.17487/rfc4067

P. Bahl, A. Balachandran, and S. Venkatachary, Secure wireless Internet access in public places, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240), 2001.
DOI : 10.1109/ICC.2001.937274

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.8619

A. Friday, M. Wu, S. Schmid, J. Finney, K. Cheverst et al., A wireless public access infrastructure for supporting mobile context-aware IPv6 applications, Proceedings of the first workshop on Wireless mobile internet , WMI '01, pp.11-18, 2001.
DOI : 10.1145/381472.381555

L. Dell-'uomo and E. Scarrone, The Mobility Management and Authentication / Authorization mechanisms in Mobile Networks beyond 3G, Mobile Radio Communications, pp.44-48, 2001.

S. Tsao and C. Lin, Design and Evaluation of UMTS-WLAN Interworking Strategies, Proc. IEEE 56 th VTC, 2002.

T. Zhang, P. Agrawal, and J. Chen, IP-based base stations and soft handoff in all-IP wireless networks, IEEE Personal Communications, vol.8, issue.5, pp.24-30, 2001.
DOI : 10.1109/98.960337

A. Misra, S. Das, A. Dutta, A. Mcauley, and S. K. Das, IDMP-based fast handoffs and paging in IP-based 4G mobile networks, IEEE Communications Magazine, vol.40, issue.3, pp.138-145, 2002.
DOI : 10.1109/35.989774

P. Ginzboorg, Seven comments on charging and billing, Communications of the ACM, vol.43, issue.11, pp.89-92, 2000.
DOI : 10.1145/353360.353369

M. Peirce, Multi-Party Electronic Payments for Mobile Communications, 2000.

E. Rosen, A. Viswanathan, and R. Callon, Multiprotocol Label Switching Architecture, 2001.
DOI : 10.17487/rfc3031

R. Braden, D. Clark, and S. Shenker, Integrated Services in the Internet Architecture: an Overview, RFC 1633, 1994.
DOI : 10.17487/rfc1633

S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang et al., An Architecture for Differentiated Services, 1998.
DOI : 10.17487/rfc2475

S. Kent and R. Atkinson, Security Architecture for the Internet Protocol, 1998.

T. Dierks and C. Allen, The TLS protocol version 1, RFC, vol.2246, issue.0, 1999.
DOI : 10.17487/rfc2246

D. Durham, E. , J. Boyle, R. Cohen, S. Herzog et al., The COPS (Common Open Policy Service) Protocol, 2000.
DOI : 10.17487/rfc2748

R. Yahalom, B. Klein, . Th, and . Beth, Trust relationships in secure systems-a distributed authentication perspective, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp.150-164, 1993.
DOI : 10.1109/RISP.1993.287635

H. Schulzrinne and E. Wedlund, Application-layer mobility using SIP, ACM SIGMOBILE Mobile Computing and Communications Review, vol.4, issue.3, pp.47-57
DOI : 10.1145/372346.372369

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.95.3546

C. Rigney, S. Willens, A. Rubens, and W. Simpson, Remote Authentication Dial-In User Service (RADIUS), 2000.

J. Hill, An Analysis of the RADIUS Authentication Protocol, 2001.

D. Stanley, J. Walker, and B. Aboba, EAP Method Requirements for Wireless LANs " , IETF draft, work in progress, draft-walker-ieee802-req-04, 2004.

K. P. Bosworth, N. Tedeschi-ahmavaara, H. Haverinen, and R. Pichna, Public Key Infrastructures ? the Next Generation [101] Meeting of the Scientific Council of GET, ENST The Point-to-Point Protocol (PPP) Interworking architecture between 3GPP and WLAN systems, BT Technology Journal IEEE Communications, vol.19103, issue.41 11, pp.74-81, 1994.

H. Dobbertin, The Status of MD5 After a Recent Attack " , RSA Laboratories' CryptoBytes, 1999.

X. Wang, X. Lai, D. Feng, and H. Yu, Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, 2004.

B. Aboba and M. Beadles, The Network Access Identifier, 1999.

R. Droms, Dynamic Host Configuration Protocol, 1997.

A. Misra, S. Das, A. Mcauley, and S. K. Das, Autoconfiguration, registration, and mobility management for pervasive computing, IEEE Personal Communications, vol.8, issue.4, pp.24-31, 2001.
DOI : 10.1109/98.944000

A. Hecker and H. Labiod, An efficient micromobility implementation for 802.1X WLANs, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754), 2004.
DOI : 10.1109/PIMRC.2004.1368807

J. Kempf, Dormant host mode alerting ('IP Paging') problem statement, 2001.
DOI : 10.17487/rfc3132

G. Judd and P. Steenkiste, Fixing 802.11 access point selection, Proc. ACM SIGCOMM 2002 Poster session, 2002.
DOI : 10.1145/571697.571720

F. Adrangi, V. Lortz, F. Bari, P. Eronen, and M. Watson, Mediating Network Discovery in the Extensible Authentication Protocol (EAP) " , Internet draft, work in progress, IETF, draft-adrangi-eap-network-discovery-00

I. Guardini, E. Demaria, J. Bournelle, and M. Laurent-maknavicius, MIPv6 Authorization and Configuration based on EAP " , Internet draft, work in progress, IETF draft-giaretta-mip6-authorization-eap-01.txt, 2004.

S. Pack and Y. Choi, Fast Inter-AP Handoff using Predicitve-Authentication Scheme in a Public Wireless LAN, IEEE Networks, 2002.

A. Mishra, M. H. Shin, N. L. Petroni, T. C. Clancy, and W. Arbaugh, Proactive key distribution using neighbor graphs, IEEE Wireless Communications, vol.11, issue.1, pp.26-36, 2004.
DOI : 10.1109/MWC.2004.1269714

S. Glass, T. Hiller, S. Jacobs, and C. Perkins, Mobile IP Authentication, Authorization, and Accounting Requirements, RFC 2977, 2000.
DOI : 10.17487/rfc2977

T. Noël, N. Montavont, and P. Bertin, Mobilité IPv6 et WLAN: Expérimentation et évaluation à l'échelle d'un campus, 2002.

J. Korhonen, Performance Implications of the Multi Layer Mobility in a Wireless Operator Networks, 2004.

C. Chiollaz, G. Legrand, A. Hecker, F. Springinsfeld, S. Naqvi et al., Politique de sécurité pour une communauté ouverte dans un espace ouvert délimité, 2004.

G. Legrand, A. Hecker, and F. Springinsfeld, Architecture flexible de réseau sans fil WiFi sécurisé, 2004.

. Wi-fi-alliance, Wireless ISP Roaming (WISPr) ? Best Current Practices, 2003.

K. Eustice, L. Kleinrock, S. Markstrum, G. Popek, V. Ramakrishna et al., Securing nomads, Proceedings of the 2003 workshop on New security paradigms , NSPW '03, 2003.
DOI : 10.1145/986655.986673

D. C. Verma, Policy-Based Networking Architecture and Algorithms, New Riders Publishing, 2000.

W. Laouiti, K. Cordoso, A. Hecker, M. Genet, B. Jouaber et al., RESACO: An Open and Programmable Multi-Domain Platform for Cooperative and Auto-Configurable Networks, 2004.

M. Montgomery, A. M. Ali, H. K. Lu, H. Labiod, and R. Duffau, Secure Network Card ? Implementation of a Standard Network Stack in a Smart Card Six Smart Card Research and Advanced Application IFIP Conference, France KMS: a key management system for multi-provider interconnected Wi-Fi WLANs, IEEE GLOBECOM, 2004.

T. Project, Virtual Point-to-Point(TUN) and Ethernet(TAP) devices

P. Urien, M. Badra, and M. Danjinou, EAP-TLS Smartcards, from Dream to Reality, 4th Workshop on Applications and Services in Wireless Networks, 2004.

J. Tourrilhes, L7-mobility: a framework for handling mobility at the application level, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754), 2004.
DOI : 10.1109/PIMRC.2004.1373897

A. Goldberg, R. Buff, and A. Schmitt, A Comparison of HTTP and HTTPS Performance, Computer Measurement Group, p.98, 1998.

V. Gupta, S. Gupta, and S. Chang, Performance analysis of elliptic curve cryptography for SSL, Proceedings of the ACM workshop on Wireless security , WiSE '02, 2002.
DOI : 10.1145/570681.570691

A. Levi and E. Savas, Performance evaluation of public-key cryptosystem operations in WTLS protocol, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, 2003.
DOI : 10.1109/ISCC.2003.1214285

L. Bernard, Integration of SIP and COPS protocols, 2002.

K. Cardoso, M. G. Genet, and D. Zeglache, COPS based management for the UMTS multimedia domain, The 5th International Symposium on Wireless Personal Multimedia Communications, 2002.
DOI : 10.1109/WPMC.2002.1088232

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A Scalable Content- Addressable Network, Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications

I. Stoica, R. Morris, D. Liben-nowell, D. Karger, M. F. Kaashoek et al., Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications

A. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Proc. IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), 2001.
DOI : 10.1007/3-540-45518-3_18

H. Hof, E. Blaß, T. Fuhrmann, and M. Zitterbart, Design of a Secure Distributed Service Directory for Wireless Sensornetworks, [151] Linksys WRT54GS Wireless Access Point, 2004.
DOI : 10.1007/978-3-540-24606-0_19

J. R. Walker, Unsafe at any key size; An analysis of the WEP encapsulation, IEEE document, vol.802362, pp.11-11, 2000.

N. Borisov, I. Goldberg, and D. Wagner, Intercepting mobile communications, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.180-188, 2001.
DOI : 10.1145/381677.381695

W. A. Arbaugh, N. Shankar, and Y. C. Wan, YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES, Wireless LANs and Home Networks, 2001.
DOI : 10.1142/9789812799562_0013

S. Fluhrer, I. Mantin, and A. Shamir, Weaknesses in the Key Scheduling Algorithm of RC4, Proc. 8 th Annual Workshop on Selected Areas in Cryptography, 2001.
DOI : 10.1007/3-540-45537-X_1

A. Stubblefield, J. Ioannidis, and A. Rubin, Using the Fluhrer, Mantin and Shamir Attack to Break WEP, 2001.

A. Mishra and W. A. Arbaugh, An Initial Security Analysis of the IEEE 802.1X Standard, 2002.

]. A. Hecker, H. Labiod, G. Pujolle, H. Afifi, A. Serhrouchni et al., A New Access Control Solution for a Multi-Provider Wireless Environment, Related Publications Journal Papers to appear in the Telecommunication Systems Journal, 2005.
DOI : 10.1007/s11235-005-2146-9

]. A. Hecker, H. Labiod, and A. Serhrouchni, Authentis: Through Incremental Authentication Models to Secure Interconnected Wi-Fi WLANs, International Refereed Conference, 2002.

A. Hecker, H. Labiod, G. Pujolle, H. Afifi, A. Serhrouchni et al., A New Access Control Solution for a Multi-Provider Wireless Environment, Telecommunication Systems, vol.6, issue.3, 2002.
DOI : 10.1007/s11235-005-2146-9

B. Zouari, H. Afifi, A. Hecker, H. Labiod, G. Pujolle et al., A novel authentication model based on secured IP smart cards, IEEE International Conference on Communications, 2003. ICC '03., 2003.
DOI : 10.1109/ICC.2003.1204441

W. Laouiti, K. Cordoso, A. Hecker, M. Genet, B. Jouaber et al., RESACO: An Open and Programmable Multi-Domain Platform for Cooperative and Auto-Configurable Networks, p.202

A. Hecker and H. Labiod, An efficient micromobility implementation for 802.1X WLANs, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754), 2004.
DOI : 10.1109/PIMRC.2004.1368807

A. Hecker and H. Labiod, A New EAP-based Signaling Protocol for IEEE 802.11 Wireless LANs, IEEE VTC Fall, 2004.

A. Hecker and H. Labiod, Pre-authenticated signaling in wireless LANs using 802.1X access control, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., 2004.
DOI : 10.1109/GLOCOM.2004.1378396

A. Hecker, E. Blass, H. Labiod, and M. Zitterbart, COMPASS: DECENTRALIZED MANAGEMENT AND ACCESS CONTROL FOR WLANS, Personal Wireless Communications, 2005.
DOI : 10.1142/9781860947315_0022

]. G. Legrand, A. Hecker, and F. Springinsfeld, Architecture flexible de réseau sans fil WiFi sécurisé, National Refereed Conference, 2004.

A. Hecker, Network Access: Centralized Architecture for Secure Port Access to Wireless Networks

.. Index and .. , 53 authentication server 114 auxiliary nodes 174 broker 137 choose before pay 48 collision detection 48 cryptographic signatures 173 digital divide problem 38 early service discovery 53 exposed station problem, 92 bursting of the Internet bubble ...... 66 captive portal... 91 heterogeneous security.................. 76 hidden station problem.................. 48 home provider ............................... 90 horizontal handover, pp.181-50

.. Intra-cell-handovers and .. Ip-spoofing-attack, 50 intrusion detection systems 53 intrusion prevention systems 54 inverse square law 53 204 INDEX landmark-ordering178 last mile problem80 medium access94 medium sense, 53 multi-path propagation ..................47 negative synergy effect..................56 network access.............................154 network mobility, p.49

.. Network-selection, 77 network selection problem133 network-oriented design90 pay-before-choose116 perfect forward secrecy, .88 networks, p.170

.. Proxying-server, 183 quality of service, p.89

.. Terminal, 92 tight coupling 80 trust architecture 52 user-oriented design 89 users 90 vertical handover, 136 virtual network, p.173

E. Appendix and . Resaco, Implementation In our implementation we used the following components: Access Point: ? PC running Linux OS kernel 2.4 with a 802.11 network adapter -Linux kernel network filter (iptables

R. Local and . Server, ? FreeRADIUS server (http://www.freeradius.org)