Internet Authentication for Remote Access

作者: Paulo Sergio Pagliusi

DOI:

关键词: Network Access ControlLightweight Extensible Authentication ProtocolComputer securityChallenge-Handshake Authentication ProtocolAuthentication protocolThe InternetMulti-factor authenticationComputer access controlIPsecEngineering

摘要: Nowadays, IP mobile devices need to employ a variety of different network access technologies gain ubiquitous connectivity. This book reviews the authentication infrastructure challenges for Internet remote supporting client mobility, and proposes series solutions obtained by adapting reinforcing security techniques arising from sources. The focus is on entity protocols that can be carried both IETF PANA carrier EAP mechanisms, possibly making use an AAA infrastructure. core idea adapt telecommunications sphere access. A proposal also given using public key based protocol. subsequent analysis proposed covers aspects, including: freshness, DoS-resistance, false-entity-in-the-middle attacks, in addition identity privacy users accessing via devices. destined researchers or anyone else who interested mechanisms aiming mobility.

参考文章(99)
Fred Piper, Sean Murphy, Cryptography: A Very Short Introduction ,(2002)
Jesse Walker, Russ Housley, The EAP Archie Protocol ,(2003)
Ashwin Palekar, Simon Josefsson, Daniel Simon, Glen Zorn, Protected EAP Protocol (PEAP) Version 2 ,(2004)
Chris J. Mitchell, Alex W. Dent, User's Guide To Cryptography And Standards (Artech House Computer Security) Artech House, Inc.. ,(2004)
David Leblanc, Brian Valentine, Michael Howard, Writing Secure Code ,(2001)
Chris J. Mitchell, Alexander W. Dent, User's guide to cryptography and standards ,(2004)
James Ma. alcolm, Lightweight Authentication in a Mobile Network (Transcript of Discussion) international workshop on security. pp. 217- 220 ,(2001)
D. Maughan, M. Schneider, M. Schertler, J. Turner, Internet Security Association and Key Management Protocol (ISAKMP) RFC. ,vol. 2408, pp. 1- 86 ,(1998)