Diameter IKEv 2 SK : Using Shared Keys to Support Interaction between

نویسنده

  • V. Cakulev
چکیده

The Internet Key Exchange Protocol version 2 (IKEv2) is a component of the IPsec architecture and is used to perform mutual authentication as well as to establish and to maintain IPsec Security Associations (SAs) between the respective parties. IKEv2 supports several different authentication mechanisms, such as the Extensible Authentication Protocol (EAP), certificates, and Shared Key (SK). Diameter interworking for Mobile IPv6 between the Home Agent (HA), as a Diameter client, and the Diameter server has been specified. However, that specification focused on the usage of EAP and did not include support for SK-based authentication available with IKEv2. This document specifies the IKEv2-server-to-Diameter-server communication when the IKEv2 peer authenticates using IKEv2 with SK. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deactivation Behavior of Carbon Nanotubes Supported Cobalt Catalysts in Fischer-Tropsch Synthesis

The effects of electronic properties of inner and outer surfaces of Carbon Nano Tubes (CNTs) on the deactivation of cobalt Fischer-Tropsch (FT) catalysts were studied. The comparative characterization of the fresh and used catalysts by TEM, XRD, TPR, BET and H2 chemisorption showed that cobalt re-oxidation, cobalt-support interactions and sintering are the main sources o...

متن کامل

Modeling Attacks In Wireless Sensor Networks

Compromises in sensor networks are a serious problem, but no general framework exists for modeling compromises. Sensors may be static or mobile, and are often deployed in groups for reliability [1, 2, 3]. One must ensure the integrity of both data reports and that of data in transit [4, 5, 6, 7]. When two sensors do not share a preloaded key, they may establish a path key using an intermediary....

متن کامل

EF hands at the N-lobe of calmodulin are required for both SK channel gating and stable SK–calmodulin interaction

Small conductance calcium-activated potassium (SK) channels respond to intracellular Ca(2+) via constitutively associated calmodulin (CaM). Previous studies have proposed a modular design for the interaction between CaM and SK channels. The C-lobe and the linker of CaM are thought to regulate the constitutive binding, whereas the N-lobe binds Ca(2+) and gates SK channels. However, we found that...

متن کامل

Chromosomal aberrations in squamous cell carcinoma and solar keratoses revealed by comparative genomic hybridization.

OBJECTIVE To identify chromosomal copy numbers of frequent genetic aberrations within squamous cell carcinomas (SCCs) and solar keratoses (SKs), and provide further evidence to support or challenge current dogma concerning the relationship between these lesions. DESIGN Retrospective analysis of genetic aberrations in DNA from SK and SCC biopsy specimens by comparative genomic hybridization. ...

متن کامل

SEISMIC BEHAVIOR OF SILOS WITH DIFFERENT HEIGHT TO DIAMETER RATIOS CONSIDERING GRANULAR MATERIAL-STRUCTURE INTERACTION

Silos are structures that are used for storing different types of granular material. Dynamic behavior of silos under seismic loads is very complex. In this paper seismic behavior of steel silos with different height to diameter ratios is investigated by considering granular material-structure interaction using ABAQUS finite element package. Silo wall is modeled by shell elements and its behavio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012