109 REFERENCES 1. A.Tee, J.R. Cleveland, and J.W. Chang. Implication o f end-user QoS requirements on PHY and MAC. IEEE 802 Executive Committee Study Group on Mobile Broadband Wireless Access, November 10, 2003. 2. Alfandi, Omar, H. Brosenne, C. Werner, and D. Hogrefe. Fast re- authentication for inter-domain handover using context transfer. International Conference on Information Networking, (ICOIN 2008). January 23-25, 2008. 3. S. Ahmad, A.H. Mir, and G.R. Beigh. Latency evaluation o f extensible authentication protocols in WLANs, 2011 IEEE 5,h International Conference on Advanced Networks and Telecommunication Systems (ANTS), December 18-21,2011. 4. C M . Huang, J.W. Li. A Context Transfer Mechanism for IEEE 802.1 lr in Centralized Wireless LAN Architecture. 22nd International Conference on Advanced Information Networking and Applications 2008 (AINA 2008), March 25-28, 2008. 5. Pink, Mario, T. Pietsch, and H. Koenig. Towards a seamless mobility solution for the real world: Handover decision. 2012 International Symposium on Wireless Communication Systems (ISWCS), August 28-31, 2012. 6. Zonoozi, Mahmood, P. Dassanayake, and M. Faulkner. Optimum hysteresis level, signal averaging time and handover delay. IEEE 47th In Vehicular Technology Conference 1997, May 4-7, 1997. 7. Rose, M. Dennis, T. Jansen, S. Hahn, and T. Kilmer. Impact o f Realistic Indoor Mobility Modelling in the Context o f Propagation Modelling on the User and Network Experience. 7th European Conference on Antennas A nd Propagation (EUCAP 2013), April 8-12, 2013 8. N. Seitz. ITU-T QoS standards for IP-based networks, IEEE Communication Magazine, June 2003. Volume 41, Issue 6, pp. 88-89. 9. P. Calhoun, M. Montemurro, and D. Stanley. Control and Provisioning of Wireless Access Points Protocol Specification. IETF RFC 5425, March 2009. 10. P. Calhoun, R. Suri, N. Cam-Winget, M. Williams, S. Hares, and B. O ’Hara. Lightweight Access Point Protocol. IETF RFC 5412, February 2010. 11. P. Narasimhan, D. Harkins, and S. Ponnuswamy. SLAPP: Secure Light Access Point Protocol. IETF RFC 5413, February 2010. 110 12. II. Vclayos, and G. Karlsson. Technique to reduce the IEEE 802.11b handoff time. 2004 IEEE international Conference on Communications, June 20-24. 2004. 13. M.H. Mazlan, S.U.S. Ariffin, M. Balfaqih, S.N.M. Hasnan, and S. Haseeb. Latency evaluation o f authentication protocols in centralized 802.11 architecture. The IE 7 International Conference on Wireless Communications and Applications (ICWCA '12), October 8-10, 2012. 14. P. Bachan. and B. Singh. Performance Evaluation o f Authentication Protocols tor IEEE 802.1 I Standard. 2010 International Confer cnee on Computer and Communication Technology (ICCCT), September 17-19. 2010. 15. H. Fathi, K. Kobara, S.S. (hakraborty, H. Imai, and R. Prasad. On the impact o f security on latency in I.WAN 802.1 lb. IEEE Global Te lecommunications Conference 2005 (GLOBECOM '05), November 2005. 16. F.C. Kuo. II. Tschofenig, F. Meyer, and X. Fu. Comparison Studies between Pre-Shard and Public Key Exchange Mechanisms for Transport Layer Security. Proceedings of 25'h IEEE International Conference on Computer Communications (IN EO C O M 2006), April 23-29. 2006. 17. A. Chiornita, L. Gheorghe, and I). Rosner. A practical analysis o f LAP authentication methods. 2010 9'h Roedunet International Conference (RoEduNet), June 24-26, 2010. 18. F. P. Garcia. R.M. Lopez, and A.F.G. Skarmeta. Access Control Solutions fo r Next Generation Networks, Telecommunications Network Current Status and Future Trends. J. O rti/ (Ed.), ISBN: 978-953-51-0341-7. InTech. 2012. 19. A. Dutta, D. Famolari. S. Das. Y. Ohba. V. Fajardo, k . Taniuchi. R. Lope/, and H. Schulzrinne. Media-Independent Pre-authentication Supporting Secure Interdomain Handover Optimization. IEEE Wireless Communications. April 2008. Volume 15, Issue 2. pp. 55-64. 20. R.M. Lopez, A. Dutta, 'i . Ohba, H. Schulzrinner. and A.F.G. Skarmeta. Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoli in 802.11 Networks. 4,h Annual International Conference on Mobile am i Ubiquitous Systems: Networking & Services 2007 (MohiOuitous 2007), Aim us t 6-10. 2007. Ill 21. F.B. Hidalgo, R.M. Lopez, and A.G. Skarmeta. Key Distribution Mechanisms fo r IEEE 802.21-Assisted Wireless Heterogeneous Networks, Mobile Networks and Management. Springer Berlin Heidelberg. 2011. Volume 68, pp. 123-134. 22. V. Narayanan, and L. Dondeti. EAP Extensions for EAP Re-authentication Protocol (ERP). IE TF RFC 5296, August 2008. 23. B. O ’hara, and A. Petrick. IEEE 802,1 I f Inter Access Point Protocol (IAPP), IEEE 802.11 Handbook: A Designer's Companion. Wiley-IEEE Standards Association. 2005. Edition 1, pp. 217-219. 24. LAM/MAN Standards Committee. Part 11: wireless LAN medium access control (MAC) and physical (PHY) specifications. IE EE S td 802.11 i-2004. IEEE Computer Society. 2004. 25. A. Mishra, M.H. Shin, and W.A. Arbaugh. Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network. 23rd Annual Joint Conference o f the IEEE Computer and Communications Socities (INFOCOM 2004), March 7-11, 2004. 26. A. Mishra, M.H. Shin, N.L. Petroni, T.C Clancy, and W.A. Arbaugh. Proactive Key Distribution using Neighbor Graphs. IEEE Wireless Communications, February 2004. Volume 11, Issue 1, pp. 26-36. 27. S. Pack, H. Jung, T. Kwon, and Y. Choi. A Selective Neighbor Caching Scheme for Fast H andoff in IEEE 802.11 Wireless Networks. IEEE International Conference on Communications 2005 (ICC ’05), May 16-20, 2005. 28. B. Sarikaya, and X. Zheng. CAPWAP Handover Protocol. IEEE International Conference on Communications 2006 (ICC ’06), June 2006. 29. C.H. Yu, M. Pan, and S.D. Wang. Adaptive Neighbor Caching for Fast BSS Transition Using IEEE 802.111 Neighbor Report. International Symposium on Parallel and Distributed Processing with Applications (ISPA ’08), December 10-12, 2008. 30. L. Cai, S. Machiraju, and H.Chen. CapAuth: A Capability-based Handover Scheme. Proceedings of IEEE Computer and Communications Societies (INFOCOM ’10), March 14-19, 2010. 31. I.F. Akylidiz, J. Xie, and S. Mohanty. A Survey o f Mobility Management in Next-Generation all-IP-based Wireless Systems. IE EE Communications, August 2004. Volume 11, Issue 4, pp. 16-28. Wireless 112 32. X. Yan, Y.A. Sekercioglu, and S. Narayanan. A Survey o f Vertical Handover Decision Algorithms in Fourth Generation Heterogeneous Wireless Networks. Journal Computer Networks: The International Journal o f Computer and Telecommunications Networking, August 2010. Volume 54, Issue 11, pp. 1848-1863. 33. M. Kassar, B. Kervella, and G. Pujolle. An overview o f vertical handover decision strategies in heterogeneous wireless networks. Journal Computer Communications, June 2008. Volume 31, Issue 10, pp. 2607-2620 34. A.H. Zahran, B. Liang, and A. Saleh. Signal threshold adaptation for vertical handoff in heterogeneous wireless networks. Journal Mobile Networks and Applications, August 2006. Volume 11, Issue 4, pp. 625-640. 35. A. Bijwe and C. G. Dethe. RSS based Vertical H andoff algorithms for Heterogeneous wireless networks. 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), May 2011. 36. W.I. Ki, B J . Lee, J.S. Song, Y.S. Shin. And Y.J. Kim. Ping-Pong Avoidance Algorithm for Vertical Handover in W ireless Overlay Networks. IEEE 6th Vehicular Technology Conference (VTC-2007), September 2007. 37. T. Ei, and F.Wang. A trajectory-aware handoff algorithm based on GPS information. Journals on Annals o f Telecommunications, January 2010. Volume 65, Issue 7-8, pp. 411-417. 38. H.S. Park, S.H. Yoon, T.H. Kim, J.S. Park, M.S. Do, and J.Y. Lee. Vertical handoff procedure and algorithm between IEEE802.11 WLAN and CDMA cellular network. Proceedings o f the 7th CDMA International Conference on Mobile Communications (CIC 2002), 2002. 39. Ubuntu Operating System, http://www.ubuntu.com, Accessed on 28 February 2013. 40. The FreeRADIUS Project, http://freeradius.org, Accessed on 28 February 2013. 41. CoovaChilli. http://coova.org/CoovaChilli, Accessed on 28 February 2013. 42. TL-WN951N, TP-Link. link.eom/en/products/details/?model=TL-WN95 IN%20, http://www.tp~ Accessed on February 2013. 43. Hostapd. http://hostap.epitest.fi/hostapd/, Accessed on 28 February 2013. 28 113 44. Intel® Centrino® Advanced-N 6200, Intel. http://www.intel.com/products/wireless/adapters/6200/index.htm, Accessed on 28 February 2013. 45. Wpasupplicant. http://hostap.epitest.fi/wpa_supplicant/, Accessed on 28 February 2013. 46. ORiNOCO 802.11 a/b/g/n USB Adapter, Proxim® wireless. http://www.proxim.com/products/enterprise-wireless-lan-wi-fi-mesh/orinococlient-products/orinoco-80211abgn-usb-adapter, Accessed on 28 February 2013. 47. AirMagnet WiFi Analyzer, Fluke Networks. http://www.flukenetworks.com/enterprise-network/wirelessnetwork/AirMagnet-WiFi-Analyzer, Accessed on 14 January 2013. 48. L. Chen, A.H. Zahran, and C.J. Sreenan. IEEE 802.21-enabled ALIVE-HO for media streaming in heterogeneous wireless networks. 17th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN), May 5-7, 2010. 49. K. Ogunjemilua, J.N. Davies, V. Grout, and R. Picking. An Investigation into Signal Strength o f 802.1 In WLAN. Proceedings o f the Fifth Collaborative Research Symposium on Security, E-Learning, Internet and Networking (SE1N 2009), November 26-27, 2009. 50. Qualnet. http://www.scalable-networks.com/content/products/qualnet, Accessed on 14 January 2013. 51. C.W. Huang, A. Chindapol, J.A. Ritcey, and J.N. Hwang. Link Layer Packet Loss Classification for Link Adaptation in WLAN. 40th Annual Conference on Information Science and Systems 2006, M arch 22-24, 2006.