Proceedings of the 38th Annual Hawaii International Conference on System Sciences
DOI: 10.1109/hicss.2005.226
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms

Abstract: This paper presents a peer-to-peer based authentication and authorization infrastructure to minimize authentication delays when mobile users roam across different wireless networks. The basic idea is to avoid exchanging security information between networks visited by a roaming user and the user's home authentication, authorization, and accounting (AAA) server that is typically located in the home network possibly far away from the visited network. Instead, authentication and authorization of a roaming user sh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Additional protocols must be defined and deployed on top of the framework to actually achieve authentication, authorization, and accounting, such as SAML [16] or Diameter SE extension [11]. Since AAA systems must sustain scalability, AAA entities may be redundant or distributed; in some systems the user account data is itinerant [8,17]. AAA protocols must be generic enough to transport different kind of information, and a peer-to-peer communication model is needed.…”
Section: Aaa Architecture Fundamentalsmentioning
confidence: 99%
“…Additional protocols must be defined and deployed on top of the framework to actually achieve authentication, authorization, and accounting, such as SAML [16] or Diameter SE extension [11]. Since AAA systems must sustain scalability, AAA entities may be redundant or distributed; in some systems the user account data is itinerant [8,17]. AAA protocols must be generic enough to transport different kind of information, and a peer-to-peer communication model is needed.…”
Section: Aaa Architecture Fundamentalsmentioning
confidence: 99%
“…A security association is established between the MC and every neighboring APs before the former associates with one of them. Similar mechanisms are employed in AAA context transfer [14] and P2P context transfer [15]. Such proactive authentication mechanisms can further reduce the authentication delay but may cause the problem of heavy traffic and waste of resources induced by redundant information transfer.…”
Section: Related Workmentioning
confidence: 99%
“…The protocol does not address key management operations which are essential in 3G-WLAN interworking systems. Differently from protocols suggested in References [8][9][10][11][12][13][14], LFR attains faster re-authentication and maintains a high state of security. Firstly, it does not require the usage of public key operations.…”
Section: Proposed Local Fast Re-authentication Protocolmentioning
confidence: 99%
“…However, since 3GPP has adopted EAP-AKA as the standard security protocol for 3G-WLAN interworking, adopting other EAP-based solutions might raise interoperability issues. Braun et al [12] proposed retrieving security context (SC) information like AVs from the previously visited security context controller (SCC) instead of retrieving them from the 3GHN. An SCC periodically broadcasts information about UEs within its perimeter to neighbor SCCs.…”
Section: Related Workmentioning
confidence: 99%