The Concept of Extensible Authentication Protocol for Mobile Equipment to Heterogeneous Network (EAP-M2H)

Article Preview

Abstract:

Extensible Authentication Protocol (EAP) is a universal authentication framework defined by RFC3748 and updated by RFC5247. It is not a specific authentication mechanism for exclusive system and then the widespread acceptance and implementation in wireless networks or other Point-to-Point (P2P) connections. A number of vendor specific EAP methods were proposed for special purpose such as EAP-MD5, EAP-TLS, EAP-TTLS, EAP-PEAP, LEAP, SPEKE, EAP-SIM, EAP-AKA, EAP-FAST, and so on. All of them have a common characteristic that the client submitted his Security Association (SA) to the neighbor Access Point (AP), then AP forward it to identify his validity by Authentication Authorization Accounting (AAA) server of both sides. Although these EAPs are design to meet the widespread authentication demands. But in fact they have the independent authentication procedure respectively. That is they are incompatible with each other. For mobile devices, in order to meet the needs of different connection it had to support many of the EAPs. This situation for the most mobile devices is a heavy load and result the inconvenient which move in the different service network. This paper devotes in solves this situation. For this goal, an extensible authentication protocol for mobile equipment to heterogeneous network (EAP-M2H) is provided in the paper. EAP-M2H development from the EAP-AKA and improve their applicability and compatibility in heterogeneous network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

204-208

Citation:

Online since:

December 2011

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] B. Aboba, D. Simon, P. Eronen, Extensible Authentication Protocol (EAP) Key Management Framework, RFC5247, August(2008).

DOI: 10.17487/rfc5247

Google Scholar

[2] E. T. S. I. (ETSI), Recommendation GSM 03. 20, security related network functions, tech. rep., June (1993).

Google Scholar

[3] 3GPP, 3rd generation partnership project, technical specification group services and systems aspects, 3G security, security requirements, tech. rep., 3GPP TS 33. 21 V3. 0. 0 (1999-02).

Google Scholar

[4] 3GPP, 3rd generation partnership project, technical specification group services and systems aspects, 3G security, Wireless Local Area Network (WLAN) interworking security, tech. rep., 3GPP TS 33. 234 V7. 3. 0 (2006-12).

Google Scholar

[5] Rafa Marin Lopez, Santiago Zapata Hernandez, Antonio F. Gomez Skarmeta, A Fast and Heterogeneous Handover Architecture based on an extended EAP lower-layer, 16th Mobile and Wireless Communications Summit, 1-5 July , Page(s): 1 – 5, Digital Object Identifier 10. 1109/ISTMWC. 2007. 4299294. (2007).

DOI: 10.1109/istmwc.2007.4299294

Google Scholar

[6] David Binet, Antony Martin, Brahim Gaabab, A Proactive Authentication Integration for the Network Mobility", (ICWMC , 07) Third International Conference on Wireless and Mobile Communications, March, Page(s): 53 – 53, Digital Object Identifier 10. 1109/ICWMC. 2007. 6. (2007).

DOI: 10.1109/icwmc.2007.6

Google Scholar

[7] S.G. Polito, H. Schulzrinne, Authentication and Authorization Method in Multi-domain, Multi-provider Networks, 3rd EuroNGI Conference on Next Generation Internet Networks, 21-23 May, Page(s): 174 – 181, Digital Object Identifier 10. 1109/NGI. 2007. 371213. (2007).

DOI: 10.1109/ngi.2007.371213

Google Scholar

[8] Tarun Joshi, Anindo Mukherjee, D.P. Agrawal, Exploiting Mobility Patterns to Reduce Re-Authentication Overheads in Infrastructure WLAN Networks, Canadian Conference on Electrical and Computer Engineering, May, Page(s): 1423 – 1426, Digital Object Identifier 10. 1109/CCECE. 2006. 277394. (2006).

DOI: 10.1109/ccece.2006.277394

Google Scholar

[9] Mohamad Badra, Pascal Urien, Ibrahim Hajjeh, Flexible and fast security solution for wireless LAN, Pervasive and Mobile Computing, Volume: 3, Issue: 1, January, pp.1-14. (2007).

DOI: 10.1016/j.pmcj.2006.06.002

Google Scholar

[10] Muhammad Sher, Thomas Magedanz, 3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model, The Second International Conference on Availability, Reliability and Security, 10-13 April, Page(s): 198 – 205, Digital Object Identifier 10. 1109/ARES. 2007. 1. (2007).

DOI: 10.1109/ares.2007.1

Google Scholar

[11] Ram Dantu, Gabriel Clothier, Anuj Atri, EAP methods for wireless networks, Computer Standards & Interfaces Volume: 29, Issue: 3, March, 2007, pp.289-301. (2007).

DOI: 10.1016/j.csi.2006.04.001

Google Scholar