Towards an Authentication Protocol for Service Outsourcing Over IP Networks

نویسندگان

  • Hua Wang
  • Zhongwei Zhang
  • David Lai
چکیده

When an IP network is unable to provide users with demanded services, it usually outsources to other networks. Outsourcing will involve the process of authenticating users for services over IP networks. The process can become complex when different networks have different authentication schemes, in which users are required to provide varying sets of information for service authentication. In this paper, we propose a new service authentication protocol by means of which many networks are linked together forming an ad hoc network system. This ad hoc network system will provide an aggregated range of services to users. Individual networks within the system retain their own authentication schemes and the result of user authentication can be relayed to other networks within the system. We argue that with this protocol, the burden of collecting authentication information and obtaining authentication for each outsourced service is alleviated. We also demonstrate how to construct a service authentication framework and apply the protocol in two case studies. Keywords— autonomous network, service authentication, outsource service, authentication propagation, authentication token.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Mobility and security in IP network

In mobile networks, mechanisms of security and Quality of Service (QoS) used in the fixed networks are not adapted. The mobility of the users makes problems of authentication and conservation of QoS during handoffs. In this study, we focus on the management of security and QoS for user’s mobility. We propose an architecture authentication, which use a network management protocol (Common Open Po...

متن کامل

Critical voice network security analysis and new approach for securing Voice over IP Communications

Voice networks evolved from the fixed traditional telephone system, to mobile and wireless networks and now towards a converged voice and data infrastructure. This convergence is based on the spread of the Internet Protocol, where VoIP is developing. Due to IP network characteristics, hackers are able to compromise and take control of different aspects of IP telephony such as signaling informat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005