Research Article
A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN
Table 1
Security comparisons.
| ā | Scheme | Scheme | Scheme | ā | [8] | [9] | [10] | [proposed one] |
| L3/L2 key management | None | None | Yes | Yes | Interaction with AAA | Required | Required | Required | Not required | L3 key generation | by AR | by MN | by MN | by MN | L2 key generation | 802.1x-EAP | 802.1x-EAP | from L3 key | from L3 key | Protection for UNA | None | Provided | Provided | Provided | Security attack due to L3 key compromise | Secure | Secure | Insecure | Secure |
|
|