메뉴 건너뛰기




Volumn 15, Issue 3, 2010, Pages 392-412

A kerberized architecture for fast re-authentication in heterogeneous wireless networks

Author keywords

AAA; Authentication; EAP; Fast handoff; Kerberos; Network security; Performance

Indexed keywords

AUTHENTICATION DELAYS; DEPLOYMENT SCENARIOS; EAP; EXTENSIBLE AUTHENTICATION PROTOCOLS; FAST HANDOFF; HETEROGENEOUS WIRELESS NETWORK; KERBEROS NETWORK; KERBEROS PROTOCOL; MATHEMATICAL ANALYSIS; MOBILE NETWORKS; MOBILE USERS; MODES OF OPERATION; NETWORK ACCESS; PERFORMANCE COMPARISON; PROPOSED ARCHITECTURES; SIMULATION AND ANALYSIS; SIMULATION RESULT; WIRELESS TESTBED;

EID: 77952423508     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11036-009-0220-3     Document Type: Article
Times cited : (15)

References (49)
  • 1
    • 58149311082 scopus 로고    scopus 로고
    • Kerberized handover keying: A media-independent handover key management architecture
    • Ohba Y, Das S, Dutta A (2007) Kerberized handover keying: a media-independent handover key management architecture. In: Proc of ACM MobiArch
    • (2007) Proc of ACM MobiArch
    • Ohba, Y.1    Das, S.2    Dutta, A.3
  • 2
    • 57649229333 scopus 로고    scopus 로고
    • Evaluation of AAA infrastructure deployment in Euro6ix IPv6 network project
    • ACNS, technical track
    • Marin R, Martinez G, Skarmeta A (2004) Evaluation of AAA infrastructure deployment in Euro6ix IPv6 network project. In: Proc of applied cryptography and network security, ACNS, technical track, pp 325-334
    • (2004) Proc of Applied Cryptography and Network Security , pp. 325-334
    • Marin, R.1    Martinez, G.2    Skarmeta, A.3
  • 4
    • 77950315765 scopus 로고    scopus 로고
    • Extensible authentication protocol key management framework
    • Aboba B, Simon D, Eronen P (2008) Extensible authentication protocol key management framework. RFC 5247
    • (2008) RFC , pp. 5247
    • Aboba, B.1    Simon, D.2    Eronen, P.3
  • 5
    • 0038065851 scopus 로고    scopus 로고
    • PPP EAP TLS authentication protocol
    • Aboba B, Simon D (1999) PPP EAP TLS authentication protocol. RFC 2716
    • (1999) RFC , pp. 2716
    • Aboba, B.1    Simon, D.2
  • 8
    • 77952430378 scopus 로고    scopus 로고
    • Handover key management and re-authentication problem statement
    • Narayanan V, Clancy T, Nakhjiri M, Dondeti L (2008) Handover key management and re-authentication problem statement. RFC 5169
    • (2008) RFC , pp. 5169
    • Narayanan, V.1    Clancy, T.2    Nakhjiri, M.3    Dondeti, L.4
  • 9
    • 77952426900 scopus 로고    scopus 로고
    • WiMax Forum. http://www.wimaxforum.org/
  • 10
    • 33750963358 scopus 로고    scopus 로고
    • The Kerberos network authentication service (V5)
    • Neuman C, Yu T, Hartman S, Raeburn K (2005) The Kerberos network authentication service (V5). RFC 4120
    • (2005) RFC , vol.4120
    • Neuman, C.1    Yu, T.2    Hartman, S.3    Raeburn, K.4
  • 13
    • 0003218526 scopus 로고    scopus 로고
    • Remote authentication dial in user service (RADIUS)
    • Rigney C, Willens S, Rubens A, Simpson W (2000) Remote authentication dial in user service (RADIUS). RFC 2865
    • (2000) RFC , pp. 2865
    • Rigney, C.1    Willens, S.2    Rubens, A.3    Simpson, W.4
  • 14
    • 2942667311 scopus 로고    scopus 로고
    • Diameter base protocol
    • Calhoun P, Loughney J (2003) Diameter base protocol. RFC 3588
    • (2003) RFC , pp. 3588
    • Calhoun, P.1    Loughney, J.2
  • 15
    • 33846610677 scopus 로고    scopus 로고
    • EAP methods for wireless networks
    • DOI 10.1016/j.csi.2006.04.001, PII S092054890600050X
    • R Dantu G Clothier A Atri 2007 EAP methods for wireless networks Computer Standards Interfaces 29 3 289 301 10.1016/j.csi.2006.04.001 (Pubitemid 46185910)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.3 , pp. 289-301
    • Dantu, R.1    Clothier, G.2    Atri, A.3
  • 16
    • 34247566117 scopus 로고    scopus 로고
    • Extensible Authentication Protocol (EAP) method requirements for wireless LANs
    • Stanley D, Aboba B, Walker J (2005) Extensible Authentication Protocol (EAP) method requirements for wireless LANs. RFC 4017
    • (2005) RFC , pp. 4017
    • Stanley, D.1    Aboba, B.2    Walker, J.3
  • 17
    • 54849432299 scopus 로고    scopus 로고
    • Specification for the derivation of root keys from an Extended Master Session Key (EMSK)
    • Salowey J, Dondeti L, Narayanan V, Nakhjiri M (2008) Specification for the derivation of root keys from an Extended Master Session Key (EMSK). RFC 5247
    • (2008) RFC , pp. 5247
    • Salowey, J.1    Dondeti, L.2    Narayanan, V.3    Nakhjiri, M.4
  • 26
    • 77952421414 scopus 로고    scopus 로고
    • Free Radius. http://www.freeradius.org
  • 27
  • 33
    • 51549105733 scopus 로고    scopus 로고
    • A Kerberos-based EAP method for re-authentication with integrated support for fast handover and IP mobility in wireless LANs
    • ICCE 2008
    • Almus H, Brose E, Rebensburg K (2008) A Kerberos-based EAP method for re-authentication with integrated support for fast handover and IP mobility in wireless LANs. In: Proc of the 2nd international conference on communications and electronics, ICCE 2008, pp 61-66
    • (2008) Proc of the 2nd International Conference on Communications and Electronics , pp. 61-66
    • Almus, H.1    Brose, E.2    Rebensburg, K.3
  • 34
    • 0028397595 scopus 로고
    • Authentication of mobile users
    • 10.1109/65.272938
    • R Molva D Samfat G Tsudik 1994 Authentication of mobile users IEEE Networks 8 2 26 35 10.1109/65.272938
    • (1994) IEEE Networks , vol.8 , Issue.2 , pp. 26-35
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 35
    • 53749087129 scopus 로고    scopus 로고
    • A secure fast Handover scheme based on AAA protocol in mobile IPv6 networks
    • 10.1016/S1005-8885(08)60147-8
    • M Song L Wang J Song 2008 A secure fast Handover scheme based on AAA protocol in mobile IPv6 networks J China Univ Post Telecommun 15 1 14 18 10.1016/S1005-8885(08)60147-8
    • (2008) J China Univ Post Telecommun , vol.15 , Issue.1 , pp. 14-18
    • Song, M.1    Wang, L.2    Song, J.3
  • 39
    • 77955310953 scopus 로고    scopus 로고
    • Guidance for authentication, authorization, and accounting (AAA) key management
    • Housley R, Aboba B (2007) Guidance for authentication, authorization, and accounting (AAA) key management. RFC 4962
    • (2007) RFC , pp. 4962
    • Housley, R.1    Aboba, B.2
  • 40
    • 38349039255 scopus 로고    scopus 로고
    • 3-party approach for fast handover in EAP-based wireless networks
    • IS 2007, LNCS 4804
    • Marin R, Fernandez PJ, Gomez AF (2007) 3-party approach for fast handover in EAP-based wireless networks. In: Proc of the on the move (OTM) conferences, IS 2007, LNCS 4804, pp 1734-1751
    • (2007) Proc of the on the Move (OTM) Conferences , pp. 1734-1751
    • Marin, R.1    Fernandez, P.J.2    Gomez, A.F.3
  • 41
    • 0029250361 scopus 로고
    • The KryptoKnight family of light-weight protocols for authentication and key distribution
    • 10.1109/90.365435
    • R Bird I Gopal A Herzberg P Janson S Kutten R Molva M Yung 1995 The KryptoKnight family of light-weight protocols for authentication and key distribution IEEE/ACM Trans Netw 3 1 31 41 10.1109/90.365435
    • (1995) IEEE/ACM Trans Netw , vol.3 , Issue.1 , pp. 31-41
    • Bird, R.1    Gopal, I.2    Herzberg, A.3    Janson, P.4    Kutten, S.5    Molva, R.6    Yung, M.7
  • 44
    • 4544274584 scopus 로고    scopus 로고
    • Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks
    • 10.1109/MWC.2004.1325894
    • C Politis K Chew N Akhtar M Georgiades R Tafazolli T Dagiuklas 2004 Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks IEEE Wirel Commun 11 4 76 88 10.1109/MWC.2004.1325894
    • (2004) IEEE Wirel Commun , vol.11 , Issue.4 , pp. 76-88
    • Politis, C.1    Chew, K.2    Akhtar, N.3    Georgiades, M.4    Tafazolli, R.5    Dagiuklas, T.6
  • 45
    • 33845519453 scopus 로고    scopus 로고
    • Reducing reauthentication delay in wireless networks
    • Aura T, Roe M (2005) Reducing reauthentication delay in wireless networks. In: Proc of IEEE SECURECOMM 2005, pp 139-148
    • (2005) Proc of IEEE SECURECOMM 2005 , pp. 139-148
    • Aura, T.1    Roe, M.2
  • 46
    • 33847263581 scopus 로고    scopus 로고
    • Improving cross-domain authentication over wireless local area networks
    • Kim H, Shin KG, Dabbous W (2005) Improving cross-domain authentication over wireless local area networks. In: Proc of IEEE SECURECOMM'05, pp 103-109
    • (2005) Proc of IEEE SECURECOMM'05 , pp. 103-109
    • Kim, H.1    Shin, K.G.2    Dabbous, W.3
  • 47
    • 1842665111 scopus 로고    scopus 로고
    • Proactive key distribution using neighbor graphs
    • 10.1109/MWC.2004.1269714
    • A Mishra M Shin N Petroni C Clancy W Arbaugh 2004 Proactive key distribution using neighbor graphs IEEE Wirel Commun 11 1 26 36 10.1109/MWC.2004.1269714
    • (2004) IEEE Wirel Commun , vol.11 , Issue.1 , pp. 26-36
    • Mishra, A.1    Shin, M.2    Petroni, N.3    Clancy, C.4    Arbaugh, W.5
  • 48
    • 11244325366 scopus 로고    scopus 로고
    • Fast inter-AP handoff using predictive-authentication scheme in a public wireless LAN
    • (Joint ICN 2002 and ICWLHN 2002)
    • Pack S, Choi Y (2002) Fast inter-AP handoff using predictive- authentication scheme in a public wireless LAN. In: Proc of IEEE networks 2002 (Joint ICN 2002 and ICWLHN 2002)
    • (2002) Proc of IEEE Networks 2002
    • Pack, S.1    Choi, Y.2
  • 49
    • 77953320964 scopus 로고    scopus 로고
    • EAP extensions for EAP re-authentication protocol (ERP)
    • Narayanan V, Dondeti L (2008) EAP extensions for EAP re-authentication protocol (ERP). RFC 5296
    • (2008) RFC , pp. 5296
    • Narayanan, V.1    Dondeti, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.