An Authentication and Authorization Architecture for the Mobile Internet

نویسنده

  • T. Braun
چکیده

The paper describes an authentication and authorization architecture for mobile Internet users. The architecture is based on the Shibboleth middleware that has been developed by the Middleware Architecture Committee for Education of the Internet2 Middleware Initiative. The initial goal of this middleware was access control to digital content available in the Internet. We propose to use this middleware also for controlling Internet access via wireless local area networks. First, users need to negotiate credentials with their home organization. After a single login at their home organization roaming users can access the Internet via different (wireless) access networks. The system has been implemented on Linux platforms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

- 1 - Authentication , Authorization , Accounting , and Charging for the Mobile Internet

Mobile data services across the Internet pave the path for a society of tomorrow. Users will be able to access data, information, and services independent of their location, which will ease the way of business and private life, such as for the traveling field engineer repairing electronic devices at the customers’ premises by downloading a new control software or the family on vacation accessin...

متن کامل

Authentication , Authorization , Accounting , and Charging for the Mobile Internet

Mobile data services across the Internet pave the path for a society of tomorrow. Users will be able to access data, information, and services independent of their location. This will ease the way of business and private life, such as for the travelling field engineer repairing electronic devices at the customers’ premises by downloading a new control software or the family on vacation accessin...

متن کامل

AAA Architecture for WLAN over IPv6

Internet applications over the becoming standard IPv6 network have been increased significantly. Together with the rapid growth of mobile devices, a secure wireless IPv6 environment is needed. Current security methods, including EAP, 802.1x, Radius, etc., are still inadequate. In this paper, we study the security issues of IPv6, and its threats in the wireless environment, and propose an AAA (A...

متن کامل

RFC 2906 AAA Authorization Requirements

AAA Authorization Requirements Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document specifies the requirements that Authentication Authorization Accounting (AAA) protocols must meet in order to support authorization services in the Internet. The requirem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005