Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A New Authenticator
KTH, School of Information and Communication Technology (ICT).
2010 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

This thesis is part of a larger project on non-binary alternatives to authentication; in contrast to the binary authentication used in IEEE 802.1X and IEEE 802.11i. This thesis project seeks to define, implement, and evaluate a non-binary wireless access authentication mechanism. It introduces a new authenticator that implements such a new non-binary authentication mechanism.

In today’s wireless local area networks it is generally not possible to continue a multimedia roaming session smoothly, because of the long delay caused by authentication – during which no traffic other than authentication traffic is permitted. In the best cases this high delay results in a long communication interruption interval without media, while in the worst cases the session is aborted by the higher layer application as the application believes that the connectivity is lost. Thus introducing a more appropriate authentication mechanism enables mobile users who move into a new wireless local area network cell to continue to send and receive packets with greatly reduced handover latency (in comparison to existing authentication mechanisms). This new authentication mechanism potentially enables seamless roaming for users of conversational multimedia services (for example, a voice over IP call could continue despite a movement from one cell to another).

This thesis demonstrates that it is possible to allow unauthenticated users to immediately begin to communicate, while simultaneously limiting their traffic. These limitations in traffic are implemented by traffic shaping. Additionally, using traffic shaping also offers a number of new possibilities – such as offering different qualities of service, allowing negotiation for different maximum bandwidths, etc.

Place, publisher, year, edition, pages
2010. , 163 p.
Identifiers
URN: urn:nbn:se:kth:diva-28758OAI: oai:DiVA.org:kth-28758DiVA: diva2:389747
Uppsok
Technology
Examiners
Available from: 2011-01-20 Created: 2011-01-20 Last updated: 2011-01-20Bibliographically approved

Open Access in DiVA

fulltext(2842 kB)1325 downloads
File information
File name FULLTEXT01.pdfFile size 2842 kBChecksum SHA-512
e4cfa16c5908f2af392a9483f30a22a9f4ef70f81cf7656b7fad580c67f87d530db9b67a9d7b112f6e872cfbbb782c7c759742311f8379505d2bb7654622f881
Type fulltextMimetype application/pdf

By organisation
School of Information and Communication Technology (ICT)

Search outside of DiVA

GoogleGoogle Scholar
Total: 1325 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 218 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf