메뉴 건너뛰기




Volumn 16, Issue 4, 2010, Pages 519-536

Adaptive authentication and registration key management scheme based on AAA architecture

Author keywords

AAA Architecture; Authentication; Mobile Networks; Registration Key

Indexed keywords


EID: 77958562233     PISSN: 10798587     EISSN: 2326005X     Source Type: Journal    
DOI: 10.1080/10798587.2010.10643098     Document Type: Article
Times cited : (8)

References (30)
  • 1
    • 0012539576 scopus 로고    scopus 로고
    • IP Mobility Support for IPv4
    • C. Perkins, “IP Mobility Support for IPv4,” IETF RFC 3344, 2002.
    • (2002) IETF RFC , pp. 3344
    • Perkins, C.1
  • 3
    • 85024537058 scopus 로고
    • Neuman: J. L Schiller, and J.H. Saltzer, “Kerberos Authentication and Authorization System,” MIT Project Athena Technical Document
    • S.P. Miller, B. C. Neuman, J. L Schiller, and J.H. Saltzer, “Kerberos Authentication and Authorization System,” MIT Project Athena Technical Document, 1988.
    • (1988) B. C
    • Miller, S.P.1
  • 5
    • 0003237987 scopus 로고
    • The Kerberos Network Authentication Service (Version 5)
    • J. Kohl and B. C. Neuman, “The Kerberos Network Authentication Service (Version 5),” IETF RFC 1510, 1993.
    • (1993) IETF RFC , pp. 1510
    • Kohl, J.1    Neuman, B.C.2
  • 6
    • 0028514601 scopus 로고
    • Kerberos: An Authentication Service for Computer Networks
    • B. C. Neuman and T. Ts’o. “Kerberos:An Authentication Service for Computer Networks,” IEEE Communications Magazine, vol. 32, pp. 33–38, 1994.
    • (1994) IEEE Communications Magazine , vol.32 , pp. 33-38
    • Neuman, B.C.1    Ts’o, T.2
  • 7
    • 85024534926 scopus 로고    scopus 로고
    • Jacobs and S. Belgard, “Mobile IP Public Key Based Authentication,” draft jacobsmobileip-pki-auth-03.txt
    • S. Jacobs and S. Belgard, “Mobile IP Public Key Based Authentication,” draft jacobsmobileip-pki-auth-03.txt, IETF Internet-Draft, 2001.
    • (2001) IETF Internet-Draft
  • 8
    • 0003329392 scopus 로고    scopus 로고
    • Mobile IP Authentication, Authorization, and Accounting Requirements
    • S. Glass, T. Hiller, S. Jacobs, C. Perkins, “Mobile IP Authentication, Authorization, and Accounting Requirements,” IETF RFC 2977, 2000.
    • (2000) IETF RFC , pp. 2977
    • Glass, S.1    Hiller, T.2    Jacobs, S.3    Perkins, C.4
  • 9
    • 28044472621 scopus 로고    scopus 로고
    • Authentication, Authorization, and Accounting (AAA) Registration Keys for Mobile IPv4
    • C. Perkins and P. Calhoun, “Authentication, Authorization, and Accounting (AAA) Registration Keys for Mobile IPv4,” IETF RFC 3957, 2005.
    • (2005) IETF RFC , pp. 3957
    • Perkins, C.1    Calhoun, P.2
  • 11
    • 18144405252 scopus 로고
    • An Access Control Protocol, Sometimes Called TACACS
    • C. Finseth, “An Access Control Protocol, Sometimes Called TACACS,” IETF RFC 1492, 1993.
    • (1993) IETF RFC , pp. 1492
    • Finseth, C.1
  • 13
    • 0003218526 scopus 로고    scopus 로고
    • Simpson, “Remote Authentication Dial In User Service (RADIUS)
    • C. Rigney, S. Willens, A. Rubens, and W. Simpson, “Remote Authentication Dial In User Service (RADIUS), IETF RFC 2865, 2000.
    • (2000) IETF RFC , pp. 2865
    • Rigney, C.1    Willens, S.2    Rubens, A.3
  • 14
    • 77951694844 scopus 로고    scopus 로고
    • Common Remote Authentication Dial In User Service (RADIUS) Implementation Issues and Suggested Fixes
    • D. Nelson and A. DeKok, “Common Remote Authentication Dial In User Service (RADIUS) Implementation Issues and Suggested Fixes,” IETF RFC 5080, 2007.
    • (2007) IETF RFC , pp. 5080
    • Nelson, D.1    DeKok, A.2
  • 15
    • 85024593945 scopus 로고    scopus 로고
    • IETFAuthentication,Authorization,and Accounting Working Group, Accessed on June 2008.
    • IETFAuthentication,Authorization,and Accounting Working Group, http://www.ietf.org/html.charters/OLD/aaa-charter.html, Accessed on June 2008.
  • 17
    • 0042095218 scopus 로고    scopus 로고
    • Mobile IPv4 Challenge/Response Extensions
    • C. Perkins and P. Calhoun, “Mobile IPv4 Challenge/Response Extensions,” IETF RFC 3012, 2000.
    • (2000) IETF RFC , pp. 3012
    • Perkins, C.1    Calhoun, P.2
  • 18
    • 70350247806 scopus 로고    scopus 로고
    • Mobile IPv4 Challenge/Response Extensions (Revised)
    • C. Perkins, P. Calhoun, and J. Bharatia, “Mobile IPv4 Challenge/Response Extensions (Revised),” IETF RFC 4721, 2007.
    • (2007) IETF RFC , pp. 4721
    • Perkins, C.1    Calhoun, P.2    Bharatia, J.3
  • 19
    • 0003301709 scopus 로고    scopus 로고
    • Mobile IP Network Access Identifier Extension for IPv4
    • P. Calhoun, C. Perkins, “Mobile IP Network Access Identifier Extension for IPv4,” IETF RFC 2794, 2000.
    • (2000) IETF RFC , pp. 2794
    • Calhoun, P.1    Perkins, C.2
  • 20
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-Hashing for Message Authentication
    • H. Krawczyk, M. Bellare, and R. Canetti, “HMAC:Keyed-Hashing for Message Authentication,” IETF RFC 2104, 1997.
    • (1997) IETF RFC , pp. 2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 21
    • 85024567623 scopus 로고    scopus 로고
    • Nakhjiri, M. Parthasarathy, J. Bournelle, H. Tschofenig, and R Marin Lopez, “AAA based Keying for Wireless Handovers: Problem Statement,” draft-nakhjiri-aaa-hokey-ps03
    • M. Nakhjiri, M. Parthasarathy, J. Bournelle, H. Tschofenig, and R Marin Lopez, “AAA based Keying for Wireless Handovers:Problem Statement,” draft-nakhjiri-aaa-hokey-ps03, IETF Internet-Draft (expired), 2006.
    • (2006) IETF Internet-Draft (expired)
  • 22
    • 0032643561 scopus 로고    scopus 로고
    • An Efficient Authentication Protocol for Mobile Networks
    • S. Shieh, F. Ho, and Y. Huang, “An Efficient Authentication Protocol for Mobile Networks,” Journal of Information Science and Engineering, vol. 15, no. 4, pp. 505–520, 1999.
    • (1999) Journal of Information Science and Engineering , vol.15 , Issue.4 , pp. 505-520
    • Shieh, S.1    Ho, F.2    Huang, Y.3
  • 26
    • 0033876523 scopus 로고    scopus 로고
    • An inter-system handoff technique for the IMT-2000 system
    • J. McNair, LF. Akyldiz, and M.D. Bender, “An inter-system handoff technique for the IMT-2000 system,” In Proceedings of IEEE INFOCOM 2000, pp. 203–216, 2000.
    • (2000) In Proceedings of IEEE INFOCOM , vol.2000 , pp. 203-216
    • McNair, J.1    Akyldiz, L.F.2    Bender, M.D.3
  • 29
    • 4544274584 scopus 로고    scopus 로고
    • Hybrid Multilayer Mobility Management with AAA Context Transfer Capabilities for All-IP Networks
    • C. Politis, K A. Chew, N. Akhtar, M. Georgiades, and R. Tafazolli, “Hybrid Multilayer Mobility Management with AAA Context Transfer Capabilities for All-IP Networks,” IEEE Wireless Communications, vol. 11, pp. 76–88, 2004.
    • (2004) IEEE Wireless Communications , vol.11 , pp. 76-88
    • Politis, C.1    Chew, K.A.2    Akhtar, N.3    Georgiades, M.4    Tafazolli, R.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.