2009
DOI: 10.17487/rfc5448
|View full text |Cite
|
Sign up to set email alerts
|

Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
38
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 80 publications
(39 citation statements)
references
References 5 publications
0
38
0
Order By: Relevance
“…To respond to such a need Arkko et al [7], [30] used a combination of 3G authentication with key agreement mechanism specified in UMTS. In their work which is called EAP-Authentication and Key Agreement (EAP-AKA) they use longer keys than EAP-SIM.…”
Section: Related Work a Technology Specific Solutionsmentioning
confidence: 99%
“…To respond to such a need Arkko et al [7], [30] used a combination of 3G authentication with key agreement mechanism specified in UMTS. In their work which is called EAP-Authentication and Key Agreement (EAP-AKA) they use longer keys than EAP-SIM.…”
Section: Related Work a Technology Specific Solutionsmentioning
confidence: 99%
“…EAP-SIM [29] and EAP-AKA [30] are examples of EAP based authentication protocols designed for cellular networks, used by mobile phones. There are also a number of lightweight EAP based protocols developed for sensor authentication over the past few years.…”
Section: Related Workmentioning
confidence: 99%
“…EAP-Sens is an extension to the EAP-GPSK protocol [31] that aims to minimize computation and communication overhead. The described optimized solution uses three round trips between the sensor and server (six messages) for a full authentication [30]. In EAP-EHash, a full authentication can be carried out with only two round trips, if the recommended ciphersuite negotiation phase is omitted.…”
Section: Eap-swift: a Lightweight Protocol For Sensor Authenticationmentioning
confidence: 99%
“…Keys are generated by means of a Pseudo-Random Function that invokes a Key Derivation Function (KDF) such as the HMAC-SHA-256 [5]. A Master Session Key (MSK) is used to derive 802.11 session keys which are used for protecting 802.11 messages between a STN and an AP.…”
Section: A) Extensible Authentication Protocol (Eap)mentioning
confidence: 99%