期刊文献+

Architectural Approaches to Network and Service Access Authentication

Architectural Approaches to Network and Service Access Authentication
下载PDF
导出
摘要 Authentication is the first step,of central importance, for access control and for security protection in radio access networks.A general model for authentication was adopted from fixed networks and applied to the wireless world.However,the differences in the operational environment between the fixed and the wireless world,heterogeneity of the radio communications systems,new trends in service provisioning, emerging business models and performance requirements raise the need to revisit the original requirements for authentication systems and to come up with schemes that better suit current needs.In this review paper we discuss authentication in singlehop radio access networks by characterizing the current as well as the emerging authentication schemes. Authentication is the first step,of central importance, for access control and for security protection in radio access networks.A general model for authentication was adopted from fixed networks and applied to the wireless world.However,the differences in the operational environment between the fixed and the wireless world,heterogeneity of the radio communications systems,new trends in service provisioning, emerging business models and performance requirements raise the need to revisit the original requirements for authentication systems and to come up with schemes that better suit current needs.In this review paper we discuss authentication in singlehop radio access networks by characterizing the current as well as the emerging authentication schemes.
出处 《China Communications》 SCIE CSCD 2007年第3期4-16,共13页 中国通信(英文版)
基金 IST FP6 Integrated Project DAIDALOS II(IST- 2006-026943)
关键词 AUTHENTICATION access control wireless networks next-generation Internet authentication access control wireless networks next-generation Internet
  • 相关文献

参考文献33

  • 1Ana Sanz Merino,Yasuhiko Matsunaga,Manish Shah,Takashi Suzuki,Randy H. Katz.Secure Authentication System for Public WLAN Roaming[J]. Mobile Networks and Applications . 2005 (3)
  • 2M.Mesic,M.Golub."An Overview of Port-Based Network Access Control". Proceedings of the Information Systems Security,MIPRO 2006 . 2006
  • 3S.Xu,M.Matthews,C-T Huang."Security ??Issues in Privacy and Key Management Protocols of IEEE 802. 16". .
  • 4IEEE Trial-Use Recommended Practise for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution System Supporting IEEE802.11 Operation. IEEE Std.802.11F-2003 . 2003
  • 5A.R.Prasad,A.Zugenmaier,P.Schoo."Next Generation Communications and Secure Seamless Handover". Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks . 2005
  • 6M.Nakhjiri et al.AAA based Keying for Wireless Handover:Problem Statement". IETF draftwork-in-progress . 2006
  • 7D.Forsberg,Y.Ohba,B.Patil,H.Tschofenig,A.Yegin."Protocol for Carrying Authentication for Network Access (PANA)". draft-ietf-pana-pana-12 . 2006
  • 8"3G Security;Generic Authentication Architecture (GAA);System description". 3GPP GAA 33.919 .
  • 9T.Olkkonen."Generic Authentication Architecture". Security and Privacy in Pervasive Computing Seminar on Network Security . 2006
  • 10B.Aboba,L.Blunk,J.Vollbrecht,J.Carlson,H. Levkowetz."Extensible Authentication Protocol (EAP)". RFC3748 . 2004

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部