An Authentication and Authorization Architecture for the Mobile Internet
نویسنده
چکیده
The paper describes an authentication and authorization architecture for mobile Internet users. The architecture is based on the Shibboleth middleware that has been developed by the Middleware Architecture Committee for Education of the Internet2 Middleware Initiative. The initial goal of this middleware was access control to digital content available in the Internet. We propose to use this middleware also for controlling Internet access via wireless local area networks. First, users need to negotiate credentials with their home organization. After a single login at their home organization roaming users can access the Internet via different (wireless) access networks. The system has been implemented on Linux platforms.
منابع مشابه
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کامل- 1 - Authentication , Authorization , Accounting , and Charging for the Mobile Internet
Mobile data services across the Internet pave the path for a society of tomorrow. Users will be able to access data, information, and services independent of their location, which will ease the way of business and private life, such as for the traveling field engineer repairing electronic devices at the customers’ premises by downloading a new control software or the family on vacation accessin...
متن کاملAuthentication , Authorization , Accounting , and Charging for the Mobile Internet
Mobile data services across the Internet pave the path for a society of tomorrow. Users will be able to access data, information, and services independent of their location. This will ease the way of business and private life, such as for the travelling field engineer repairing electronic devices at the customers’ premises by downloading a new control software or the family on vacation accessin...
متن کاملAAA Architecture for WLAN over IPv6
Internet applications over the becoming standard IPv6 network have been increased significantly. Together with the rapid growth of mobile devices, a secure wireless IPv6 environment is needed. Current security methods, including EAP, 802.1x, Radius, etc., are still inadequate. In this paper, we study the security issues of IPv6, and its threats in the wireless environment, and propose an AAA (A...
متن کاملRFC 2906 AAA Authorization Requirements
AAA Authorization Requirements Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document specifies the requirements that Authentication Authorization Accounting (AAA) protocols must meet in order to support authorization services in the Internet. The requirem...
متن کامل