Network Working Group Problem Statement and Requirements on a 3-party Key Distribution Protocol for Handover Keying
نویسنده
چکیده
The HOKEY WG is developing solutions for optimizations as well as security key hierarchy specifications for handovers. The key derivation specifications all draw from a trust relationship that is created as a result of a "2-party" EAP authentication between a peer and a backend server, while distributing the resulting keys to third parties other than the peer and the backend server. This document describes problem statement and requirements on a three-party key distribution protocol for handover keyings. Table of
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملHandover Key Management and Re-Authentication Problem Statement
This document describes the Handover Keying (HOKEY) re-authentication problem statement. The current Extensible Authentication Protocol (EAP) keying framework is not designed to support re-authentication and handovers without re-executing an EAP method. This often causes unacceptable latency in various mobile wireless environments. This document details the problem and defines design goals for ...
متن کاملManaging Handover Authentication in Big-domain Wireless Environment
Mobility management is the key feature of wireless network. When the mobile node roams from the home network to the foreign network, the foreign network access server usually does not have the security material of the mobile node, and can not authenticate the mobile node by itself. Thus the three-party authentication is used, and the foreign network access server consults the home authenticatio...
متن کاملRFC 6697 HOKEY Architecture Design July
The Handover Keying (HOKEY) Working Group seeks to minimize handover delay due to authentication when a peer moves from one point of attachment to another. Work has progressed on two different approaches to reduce handover delay: early authentication (so that authentication does not need to be performed during handover), and reuse of cryptographic material generated during an initial authentica...
متن کاملSecurity challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous access authentications to expedite network entry. For a seamless handover, keys must be available at the target network at the time of the handover. Currently, industry is still exploring possible ways to handle keys for ...
متن کامل