Secretary-General of the UN Message on the Opening of World Space Week, 2000. ,
Half the World, 2002. ,
ICFA-SCIC Network Monitoring Report, International Committee for Future Accelerators (ICFA) ? Standing Committee on Inter-Regional Connectivity (SCIC), 2004. ,
DakNet: rethinking connectivity in developing nations, Computer, vol.37, issue.1, pp.78-83, 2004. ,
DOI : 10.1109/MC.2004.1260729
Computer Networks, 2002. ,
4G Network Architectures: WLAN Hot-Spots, Infostations and beyond, IEEE PIMRC Keynote Talk, 2002. ,
Cramming More Components Onto Integrated Circuits, Proceedings of the IEEE, vol.86, issue.1, 1965. ,
DOI : 10.1109/JPROC.1998.658762
The OSI reference model, Proceedings of the IEEE, pp.1334-1340, 1983. ,
DOI : 10.1109/PROC.1983.12775
Mobile Communications: Technologies and Challenges Signal Processing for Mobile Communications Handbook, 2004. ,
The European UMTS-auctions, European Economic Review, vol.46, issue.4-5, pp.846-858, 2002. ,
DOI : 10.1016/S0014-2921(01)00219-7
Duelling with Microwave Ovens ,
IP Mobility Support for IPv4, IETF, vol.3344, 2002. ,
SIP: Session Initiation Protocol, 2002. ,
DOI : 10.17487/rfc3261
Analysis of a Local-Area Wireless Network, ACM MOBICOM, 2000. ,
Comparison of IP micromobility protocols, IEEE Wireless Communications, vol.9, issue.1, pp.72-82, 2002. ,
DOI : 10.1109/MWC.2002.986462
IDMP: an intradomain mobility management protocol for next-generation wireless networks, IEEE Wireless Communications, vol.9, issue.3, pp.38-45, 2002. ,
DOI : 10.1109/MWC.2002.1016709
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.4808
HAWAII: A Domain-Based Approach for Supporting Mobility in Wide-area Wireless Networks, Proc. IEEE Int'l. Conf. Network Protocols, 1999. ,
A Mobility Management Protocol for IP-Based Cellular Networks, IEEE Wireless Communications, pp.31-37, 2002. ,
Applied Cryptography, 1995. ,
La cryptographie militaire, Journal des Sciences Militaires, vol.9, p.12, 1883. ,
Intrusion Detection Systems: technology and development, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003., p.710, 2003. ,
DOI : 10.1109/AINA.2003.1192972
Firewalls - Evolve or Die, BT Technol J, vol.19, issue.3, pp.89-98, 2001. ,
DOI : 10.1049/PBBT004E_ch11
A Source Address Filtering Firewall to Defend Against Denial of Service Attacks, Proc. 60th Vehicular Technology Conference, 2004. ,
Cryptographic security Techniques for wireless networks, ACM SIGOPS Operating Systems Review, vol.33, issue.2, pp.36-50, 1999. ,
DOI : 10.1145/311094.311104
Securing wireless data, Proceedings of the 15th international symposium on System Synthesis , ISSS '02, 2002. ,
DOI : 10.1145/581199.581243
The Foundations of Science, p.129, 1982. ,
DOI : 10.1017/CBO9781107252950
Fourth generation: now, it is personal!, 11th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. PIMRC 2000. Proceedings (Cat. No.00TH8525), pp.1009-1016, 2000. ,
DOI : 10.1109/PIMRC.2000.881574
Visions of 4G, Electronics & Communication Engineering Journal, vol.12, issue.6, pp.293-303, 2000. ,
DOI : 10.1049/ecej:20000608
4G ? Hype or Reality, IEE 3G Mobile Communication Technologies, pp.346-350, 2001. ,
Issues in emerging 4G wireless networks, Computer, vol.34, issue.6, pp.94-96, 2001. ,
DOI : 10.1109/2.953469
KSSL: Experiments in Wireless Internet Security, Proc. Wireless Communications and Networking Conference, pp.860-864, 2002. ,
Enhancing IP service provision over heterogeneous wireless networks: a path toward 4G, IEEE Communications Magazine, vol.39, issue.8, pp.74-81, 2001. ,
DOI : 10.1109/35.940039
Engineering Distributed Objects, 2000. ,
DOI : 10.1007/3-540-45254-0
A lightweight reconfigurable security mechanism for 3G/4G mobile devices, IEEE Wireless Communications, vol.9, issue.2, pp.60-65, 2002. ,
DOI : 10.1109/MWC.2002.998526
Network architecture for mobile communications systems beyond IMT-2000, IEEE Personal Communications, vol.8, issue.5, pp.31-37, 2001. ,
DOI : 10.1109/98.960338
IP-based IMT network platform, IEEE Personal Communications, vol.8, issue.5, pp.18-23, 2001. ,
DOI : 10.1109/98.960336
A communication gateway for infrastructure-independent 4G wireless access, IEEE Communications Magazine, vol.40, issue.3, pp.126-131, 2002. ,
DOI : 10.1109/35.989771
Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support, ACM SIGMOBILE Mobile Computing and Communications Review, vol.6, issue.3, pp.10-21, 2002. ,
DOI : 10.1145/581291.581297
Protocol for carrying Authentication for Network Access, IETF PANA Working Group Draft, 2003. ,
Context Transfer Protocol " , draft-ietf-seamoby-ctp-11.txt, approved IETF draft, work in progress, 2004. ,
DOI : 10.17487/rfc4067
Secure wireless Internet access in public places, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240), 2001. ,
DOI : 10.1109/ICC.2001.937274
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.8619
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications, Proceedings of the first workshop on Wireless mobile internet , WMI '01, pp.11-18, 2001. ,
DOI : 10.1145/381472.381555
The Mobility Management and Authentication / Authorization mechanisms in Mobile Networks beyond 3G, Mobile Radio Communications, pp.44-48, 2001. ,
Design and Evaluation of UMTS-WLAN Interworking Strategies, Proc. IEEE 56 th VTC, 2002. ,
IP-based base stations and soft handoff in all-IP wireless networks, IEEE Personal Communications, vol.8, issue.5, pp.24-30, 2001. ,
DOI : 10.1109/98.960337
IDMP-based fast handoffs and paging in IP-based 4G mobile networks, IEEE Communications Magazine, vol.40, issue.3, pp.138-145, 2002. ,
DOI : 10.1109/35.989774
Seven comments on charging and billing, Communications of the ACM, vol.43, issue.11, pp.89-92, 2000. ,
DOI : 10.1145/353360.353369
Multi-Party Electronic Payments for Mobile Communications, 2000. ,
Multiprotocol Label Switching Architecture, 2001. ,
DOI : 10.17487/rfc3031
Integrated Services in the Internet Architecture: an Overview, RFC 1633, 1994. ,
DOI : 10.17487/rfc1633
An Architecture for Differentiated Services, 1998. ,
DOI : 10.17487/rfc2475
Security Architecture for the Internet Protocol, 1998. ,
The TLS protocol version 1, RFC, vol.2246, issue.0, 1999. ,
DOI : 10.17487/rfc2246
The COPS (Common Open Policy Service) Protocol, 2000. ,
DOI : 10.17487/rfc2748
Trust relationships in secure systems-a distributed authentication perspective, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp.150-164, 1993. ,
DOI : 10.1109/RISP.1993.287635
Application-layer mobility using SIP, ACM SIGMOBILE Mobile Computing and Communications Review, vol.4, issue.3, pp.47-57 ,
DOI : 10.1145/372346.372369
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.95.3546
Remote Authentication Dial-In User Service (RADIUS), 2000. ,
An Analysis of the RADIUS Authentication Protocol, 2001. ,
EAP Method Requirements for Wireless LANs " , IETF draft, work in progress, draft-walker-ieee802-req-04, 2004. ,
Public Key Infrastructures ? the Next Generation [101] Meeting of the Scientific Council of GET, ENST The Point-to-Point Protocol (PPP) Interworking architecture between 3GPP and WLAN systems, BT Technology Journal IEEE Communications, vol.19103, issue.41 11, pp.74-81, 1994. ,
The Status of MD5 After a Recent Attack " , RSA Laboratories' CryptoBytes, 1999. ,
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, 2004. ,
The Network Access Identifier, 1999. ,
Dynamic Host Configuration Protocol, 1997. ,
Autoconfiguration, registration, and mobility management for pervasive computing, IEEE Personal Communications, vol.8, issue.4, pp.24-31, 2001. ,
DOI : 10.1109/98.944000
An efficient micromobility implementation for 802.1X WLANs, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754), 2004. ,
DOI : 10.1109/PIMRC.2004.1368807
Dormant host mode alerting ('IP Paging') problem statement, 2001. ,
DOI : 10.17487/rfc3132
Fixing 802.11 access point selection, Proc. ACM SIGCOMM 2002 Poster session, 2002. ,
DOI : 10.1145/571697.571720
Mediating Network Discovery in the Extensible Authentication Protocol (EAP) " , Internet draft, work in progress, IETF, draft-adrangi-eap-network-discovery-00 ,
MIPv6 Authorization and Configuration based on EAP " , Internet draft, work in progress, IETF draft-giaretta-mip6-authorization-eap-01.txt, 2004. ,
Fast Inter-AP Handoff using Predicitve-Authentication Scheme in a Public Wireless LAN, IEEE Networks, 2002. ,
Proactive key distribution using neighbor graphs, IEEE Wireless Communications, vol.11, issue.1, pp.26-36, 2004. ,
DOI : 10.1109/MWC.2004.1269714
Mobile IP Authentication, Authorization, and Accounting Requirements, RFC 2977, 2000. ,
DOI : 10.17487/rfc2977
Mobilité IPv6 et WLAN: Expérimentation et évaluation à l'échelle d'un campus, 2002. ,
Performance Implications of the Multi Layer Mobility in a Wireless Operator Networks, 2004. ,
Politique de sécurité pour une communauté ouverte dans un espace ouvert délimité, 2004. ,
Architecture flexible de réseau sans fil WiFi sécurisé, 2004. ,
Wireless ISP Roaming (WISPr) ? Best Current Practices, 2003. ,
Securing nomads, Proceedings of the 2003 workshop on New security paradigms , NSPW '03, 2003. ,
DOI : 10.1145/986655.986673
Policy-Based Networking Architecture and Algorithms, New Riders Publishing, 2000. ,
RESACO: An Open and Programmable Multi-Domain Platform for Cooperative and Auto-Configurable Networks, 2004. ,
Secure Network Card ? Implementation of a Standard Network Stack in a Smart Card Six Smart Card Research and Advanced Application IFIP Conference, France KMS: a key management system for multi-provider interconnected Wi-Fi WLANs, IEEE GLOBECOM, 2004. ,
Virtual Point-to-Point(TUN) and Ethernet(TAP) devices ,
EAP-TLS Smartcards, from Dream to Reality, 4th Workshop on Applications and Services in Wireless Networks, 2004. ,
L7-mobility: a framework for handling mobility at the application level, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754), 2004. ,
DOI : 10.1109/PIMRC.2004.1373897
A Comparison of HTTP and HTTPS Performance, Computer Measurement Group, p.98, 1998. ,
Performance analysis of elliptic curve cryptography for SSL, Proceedings of the ACM workshop on Wireless security , WiSE '02, 2002. ,
DOI : 10.1145/570681.570691
Performance evaluation of public-key cryptosystem operations in WTLS protocol, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, 2003. ,
DOI : 10.1109/ISCC.2003.1214285
Integration of SIP and COPS protocols, 2002. ,
COPS based management for the UMTS multimedia domain, The 5th International Symposium on Wireless Personal Multimedia Communications, 2002. ,
DOI : 10.1109/WPMC.2002.1088232
A Scalable Content- Addressable Network, Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications ,
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications ,
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Proc. IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), 2001. ,
DOI : 10.1007/3-540-45518-3_18
Design of a Secure Distributed Service Directory for Wireless Sensornetworks, [151] Linksys WRT54GS Wireless Access Point, 2004. ,
DOI : 10.1007/978-3-540-24606-0_19
Unsafe at any key size; An analysis of the WEP encapsulation, IEEE document, vol.802362, pp.11-11, 2000. ,
Intercepting mobile communications, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.180-188, 2001. ,
DOI : 10.1145/381677.381695
YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES, Wireless LANs and Home Networks, 2001. ,
DOI : 10.1142/9789812799562_0013
Weaknesses in the Key Scheduling Algorithm of RC4, Proc. 8 th Annual Workshop on Selected Areas in Cryptography, 2001. ,
DOI : 10.1007/3-540-45537-X_1
Using the Fluhrer, Mantin and Shamir Attack to Break WEP, 2001. ,
An Initial Security Analysis of the IEEE 802.1X Standard, 2002. ,
A New Access Control Solution for a Multi-Provider Wireless Environment, Related Publications Journal Papers to appear in the Telecommunication Systems Journal, 2005. ,
DOI : 10.1007/s11235-005-2146-9
Authentis: Through Incremental Authentication Models to Secure Interconnected Wi-Fi WLANs, International Refereed Conference, 2002. ,
A New Access Control Solution for a Multi-Provider Wireless Environment, Telecommunication Systems, vol.6, issue.3, 2002. ,
DOI : 10.1007/s11235-005-2146-9
A novel authentication model based on secured IP smart cards, IEEE International Conference on Communications, 2003. ICC '03., 2003. ,
DOI : 10.1109/ICC.2003.1204441
RESACO: An Open and Programmable Multi-Domain Platform for Cooperative and Auto-Configurable Networks, p.202 ,
An efficient micromobility implementation for 802.1X WLANs, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754), 2004. ,
DOI : 10.1109/PIMRC.2004.1368807
A New EAP-based Signaling Protocol for IEEE 802.11 Wireless LANs, IEEE VTC Fall, 2004. ,
Pre-authenticated signaling in wireless LANs using 802.1X access control, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., 2004. ,
DOI : 10.1109/GLOCOM.2004.1378396
COMPASS: DECENTRALIZED MANAGEMENT AND ACCESS CONTROL FOR WLANS, Personal Wireless Communications, 2005. ,
DOI : 10.1142/9781860947315_0022
Architecture flexible de réseau sans fil WiFi sécurisé, National Refereed Conference, 2004. ,
Network Access: Centralized Architecture for Secure Port Access to Wireless Networks ,
53 authentication server 114 auxiliary nodes 174 broker 137 choose before pay 48 collision detection 48 cryptographic signatures 173 digital divide problem 38 early service discovery 53 exposed station problem, 92 bursting of the Internet bubble ...... 66 captive portal... 91 heterogeneous security.................. 76 hidden station problem.................. 48 home provider ............................... 90 horizontal handover, pp.181-50 ,
50 intrusion detection systems 53 intrusion prevention systems 54 inverse square law 53 204 INDEX landmark-ordering178 last mile problem80 medium access94 medium sense, 53 multi-path propagation ..................47 negative synergy effect..................56 network access.............................154 network mobility, p.49 ,
77 network selection problem133 network-oriented design90 pay-before-choose116 perfect forward secrecy, .88 networks, p.170 ,
183 quality of service, p.89 ,
92 tight coupling 80 trust architecture 52 user-oriented design 89 users 90 vertical handover, 136 virtual network, p.173 ,
Implementation In our implementation we used the following components: Access Point: ? PC running Linux OS kernel 2.4 with a 802.11 network adapter -Linux kernel network filter (iptables ,
? FreeRADIUS server (http://www.freeradius.org) ,