Abstract
For providing seamless and secure multimedia service in Wireless network, the protocol needs, efficient design, security and reduction in authentication time when a mobile user move to an other domain (Foreign domain). This paper presents an authentication and authorization infrastructure based on AAA (Authentication, Authorization, and Accounting) to minimize the authentication delay when mobile users move between different domains in wireless networks. In this paper, an AAAH (Home network) and SCC(Security Contest Controller) hierarchy infrastructure were used. A mobile user stores information of SCCs in which the mobile user has been visited. For re-authentication, a mobile user sends the service request and information to the new SCC and it finds the shortest path. Then the new SCC gets security context from the shortest path.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Rensing, C., Hasan,, Karsten, M., Stiller, B.: A Survey and a Policy-Based Architeture and Framwork. IEEE Newtwork, 22–27 (November/December 2002)
Mitton, D., St. Johns, M., Barkley, S., Nelson, D., Patil, B., Stevens, M., Wolff, B.: Authentication, Authorization, and Accouning: Protocol Evaluation. RFC 3127 (June 2001)
Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice-Hall, Englewood Cliffs (1999)
Cam-Winget, N., Smith, D., Amann, K.: Proposed new AKM for Fast Roaming (January 2003) doc.:IEEE 802.11-03/008r0
Kim, H., Afifi, H.: Improving Mobile Authentication with New AAA Protocols. In: IEEE International Conference on Communications 2003 (ICC 2003) (May 2003)
Kim, H., Ben-Ameur, W., Afifi, H.: Toward Efficient Mobile Authentication in Wireless Inter-Domain. In: 3rd Workshop on Applicaitons and Services in Wireless Networks(ASWN), Bern, Switzerland (July 2003)
Braun, T., Kim, H.: Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms. In: Proc. of Hawaii Int. Conf. on System Sciences (HICSS), January 30, 2005, pp. 306b–306b. IEEE, Los Alamitos (2005)
Georgiades, M., Akhtar, N., Ploitis, C., Tafaziolli, R.: AAA Context Transfer for Seamless and Secure Multimedia Services over ALL-IP Infrastructures. In: 5th Eurppean Wireless Conference(EW 2004), Barcelona, February 24-27 (2004)
Wang, H., Prasad, A.: Security Context Transfer in Vertical Handover. In: 14th IEEE 2003 International Symposium on Personal, Indoor and Mobile Radio Communication Processing, Beijing, September 7-10 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jin, Z.A., Lee, SE., Yoo, K.Y. (2008). Efficient Authentication and Authorization Infrastructure for Mobile Users. In: Ishikawa, Y., et al. Advanced Web and Network Technologies, and Applications. APWeb 2008. Lecture Notes in Computer Science, vol 4977. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89376-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-89376-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89375-2
Online ISBN: 978-3-540-89376-9
eBook Packages: Computer ScienceComputer Science (R0)