Network Working Group Problem Statement and Requirements on a 3-party Key Distribution Protocol for Handover Keying

نویسنده

  • D. Harkins
چکیده

The HOKEY WG is developing solutions for optimizations as well as security key hierarchy specifications for handovers. The key derivation specifications all draw from a trust relationship that is created as a result of a "2-party" EAP authentication between a peer and a backend server, while distributing the resulting keys to third parties other than the peer and the backend server. This document describes problem statement and requirements on a three-party key distribution protocol for handover keyings. Table of

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Handover Key Management and Re-Authentication Problem Statement

This document describes the Handover Keying (HOKEY) re-authentication problem statement. The current Extensible Authentication Protocol (EAP) keying framework is not designed to support re-authentication and handovers without re-executing an EAP method. This often causes unacceptable latency in various mobile wireless environments. This document details the problem and defines design goals for ...

متن کامل

Managing Handover Authentication in Big-domain Wireless Environment

Mobility management is the key feature of wireless network. When the mobile node roams from the home network to the foreign network, the foreign network access server usually does not have the security material of the mobile node, and can not authenticate the mobile node by itself. Thus the three-party authentication is used, and the foreign network access server consults the home authenticatio...

متن کامل

RFC 6697 HOKEY Architecture Design July

The Handover Keying (HOKEY) Working Group seeks to minimize handover delay due to authentication when a peer moves from one point of attachment to another. Work has progressed on two different approaches to reduce handover delay: early authentication (so that authentication does not need to be performed during handover), and reuse of cryptographic material generated during an initial authentica...

متن کامل

Security challenges in seamless mobility: how to "handover" the keys?

In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous access authentications to expedite network entry. For a seamless handover, keys must be available at the target network at the time of the handover. Currently, industry is still exploring possible ways to handle keys for ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007