Protected session keys context for distributed session key management
نویسنده
چکیده
Handoffs must be fast for wireless mobile nodes (MN) without sacrificing security between the MN and the wireless access points in the access networks. We describe and analyze our new secure Session Keys Context (SKC) scheme which has all the good features, like mobility and security optimization, of the currently existing key distribution proposals, namely key-request, preauthentication, and pre-distribution. We analyze these solutions together, and provide some conclusions on possible co-operative scenarios and on which level of the network to implement them. Finally before conclusions we provide some handoff delay simulation results with SKC and key request schemes with corresponding example handoff scenarios with a next generation radio link layer.
منابع مشابه
LTE key management analysis with session keys context
Handover key management in mobile wireless networks targets to minimize the effects of a possible key compromise in the access points. We describe and analyze how the new 3GPP Long Term Evolution (LTE) security architecture and handover keying management fulfills this target. We discuss possible LTE handover key management enhancements and implementation alternatives without losing interoperabi...
متن کاملPattern Language for Cryptographic Key Management
Many services in a distributed public network like the Internet require secure communications. Security in communications consists of confidentiality, integrity, authenticity, and non-repudiability. These aims can be achieved with cryptography. Key management plays a fundamental role in secure communications, as it is the basis of all cryptographic functions. This paper describes a pattern lang...
متن کاملDistributed registration and key distribution (DiRK)
This paper proposes a technique that can be used in a conferencing system to handle participants registration and key distribution in a decentralized and distributed way. The technique is named DiRK, an acronym derived from Distributed Registration and Key distribution. The basic idea of DiRK is to distinguish between active and passive participants in a particular conference session, and to ha...
متن کاملDistribution of EAP-Based Keys for Handover and Re-Authentication
This document describes an abstract mechanism for delivering root keys from an Extensible Authentication Protocol (EAP) server to another network server that requires the keys for offering security protected services, such as re-authentication, to an EAP peer. The distributed root key can be either a usage-specific root key (USRK), a domain-specific root key (DSRK), or a domain-specific usagesp...
متن کاملApplied Security — Final exam review
Answer: Long-term storage of keys, specially in disk, must take into account handling of backups and possible direct access to the underlying media. Therefore, keys’ long term storage should take place in encrypted format. For instance, an administrative password may be used to encrypt the keys. Even better, keys could be encrypted using an administrative key that is physically protected in phy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Wireless Personal Communications
دوره 43 شماره
صفحات -
تاریخ انتشار 2007