A first base station which initially receives a service request from a
wireless terminal requests authentication information from a central
security node and receives in response at least, one, but typically two
or more, sets of security information. When it is time for a handoff from
the first base station to a second base station, the first base station
transmits to the second base station at least one of the sets of security
information it received from the central security node. The second base
station then uses the information it received from the first base station
to authenticate the wireless terminal.