[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Efficient Authentication and Authorization Infrastructure for Mobile Users

  • Conference paper
Advanced Web and Network Technologies, and Applications (APWeb 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4977))

Included in the following conference series:

  • 889 Accesses

Abstract

For providing seamless and secure multimedia service in Wireless network, the protocol needs, efficient design, security and reduction in authentication time when a mobile user move to an other domain (Foreign domain). This paper presents an authentication and authorization infrastructure based on AAA (Authentication, Authorization, and Accounting) to minimize the authentication delay when mobile users move between different domains in wireless networks. In this paper, an AAAH (Home network) and SCC(Security Contest Controller) hierarchy infrastructure were used. A mobile user stores information of SCCs in which the mobile user has been visited. For re-authentication, a mobile user sends the service request and information to the new SCC and it finds the shortest path. Then the new SCC gets security context from the shortest path.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Rensing, C., Hasan,, Karsten, M., Stiller, B.: A Survey and a Policy-Based Architeture and Framwork. IEEE Newtwork, 22–27 (November/December 2002)

    Google Scholar 

  2. Mitton, D., St. Johns, M., Barkley, S., Nelson, D., Patil, B., Stevens, M., Wolff, B.: Authentication, Authorization, and Accouning: Protocol Evaluation. RFC 3127 (June 2001)

    Google Scholar 

  3. Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice-Hall, Englewood Cliffs (1999)

    Google Scholar 

  4. Cam-Winget, N., Smith, D., Amann, K.: Proposed new AKM for Fast Roaming (January 2003) doc.:IEEE 802.11-03/008r0

    Google Scholar 

  5. Kim, H., Afifi, H.: Improving Mobile Authentication with New AAA Protocols. In: IEEE International Conference on Communications 2003 (ICC 2003) (May 2003)

    Google Scholar 

  6. Kim, H., Ben-Ameur, W., Afifi, H.: Toward Efficient Mobile Authentication in Wireless Inter-Domain. In: 3rd Workshop on Applicaitons and Services in Wireless Networks(ASWN), Bern, Switzerland (July 2003)

    Google Scholar 

  7. Braun, T., Kim, H.: Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms. In: Proc. of Hawaii Int. Conf. on System Sciences (HICSS), January 30, 2005, pp. 306b–306b. IEEE, Los Alamitos (2005)

    Chapter  Google Scholar 

  8. Georgiades, M., Akhtar, N., Ploitis, C., Tafaziolli, R.: AAA Context Transfer for Seamless and Secure Multimedia Services over ALL-IP Infrastructures. In: 5th Eurppean Wireless Conference(EW 2004), Barcelona, February 24-27 (2004)

    Google Scholar 

  9. Wang, H., Prasad, A.: Security Context Transfer in Vertical Handover. In: 14th IEEE 2003 International Symposium on Personal, Indoor and Mobile Radio Communication Processing, Beijing, September 7-10 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jin, Z.A., Lee, SE., Yoo, K.Y. (2008). Efficient Authentication and Authorization Infrastructure for Mobile Users. In: Ishikawa, Y., et al. Advanced Web and Network Technologies, and Applications. APWeb 2008. Lecture Notes in Computer Science, vol 4977. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89376-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89376-9_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89375-2

  • Online ISBN: 978-3-540-89376-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics