2012
DOI: 10.17487/rfc6630
|View full text |Cite
|
Sign up to set email alerts
|

EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK)

Abstract: The Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. The EAP Re-authentication Protocol (ERP) specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an EAP re-authentication server through any authenticator. Authenticated Anticipatory Keying (AAK) is a method by which cryptographic keying material may be established upon one or more Candidate A… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Mishra et al (2004), S. Pack & Y. Choi (2002, Z. Cao et al (2011), F.Bernal-Hidalgo et al (2011) propose the pre-installation of cryptographic material (e.g., keys) in candidate authenticators so that the keys required for secure association are already available when the peer moves to the authenticators. As depicted in Fig.…”
Section: Key Pre-distributionmentioning
confidence: 99%
“…Mishra et al (2004), S. Pack & Y. Choi (2002, Z. Cao et al (2011), F.Bernal-Hidalgo et al (2011) propose the pre-installation of cryptographic material (e.g., keys) in candidate authenticators so that the keys required for secure association are already available when the peer moves to the authenticators. As depicted in Fig.…”
Section: Key Pre-distributionmentioning
confidence: 99%
“…o the peer; o the authenticator, which is a part of the SAP and CAPs; o the EAP server; o the ER server; and o the ER/AAK server [RFC6630], either in the home domain or local to the authenticator.…”
Section: Components Of the Hokey Architecturementioning
confidence: 99%