An 802.1X-based Security Architecture for MIP

نویسندگان

  • Hélio Araújo
  • Rodolphe Marques
  • André Zúquete
چکیده

Falei tambem da situacao em que nao existe FA na rede, embora eu pense que isso nao interessa neste artigo. Deixei tambem umas imagens no fim que podem ser interessantes. O related work esta um pouco fraco. É supost fazer uma analise mais sucinta daquilo que é proposto no artigo e apontar desvantagens e em relacao à nossa implementacao, e se possivel analisar mais artigos.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach

In this paper, we have focus existing and proposedWLAN security technologies designed to improve 802.11 standard by applying security policies. We have extensively analyzed the effect of crypto parameters over WLAN based on packet level characteristics by applying security policy to individual packet. We have also analyzed the effect of TCP and UDP traffic over our proposed WLAN test bed archit...

متن کامل

A Policy-Based Architecture for Protecting 802.11 WLANS Against DDOS Attacks

The security mechanisms available in 802.11WLANs are considered to be extremely vulnerable to malicious attacks. This paper proposes a policy-based architecture to protect 802.11 WLANs against Distributed Denial of Service (DDoS) attacks. The architecture proposed is based on the 802.1X standard, which forms the basis of the Robust Security Network (RSN) framework. The main focus of our work is...

متن کامل

A simple security model for emerging 802.11 pervasive environments

One of the most critical issues for pervasive environment is security. This paper proposes to adapt the security architecture (IEEE 802.1x) that is going to be deployed in emerging wireless networks. In particular we suggest working with dedicated smartcards, recently described in an internet draft [6], and processing the Extensible Authentication Protocol [10].

متن کامل

A Kerberos-Based Authentication Architecture for Wireless LANs

This work addresses the issues related to authentication in wireless LAN environments, with emphasis on the IEEE 802.11 standard. It proposes an authentication architecture for Wireless networks. This architecture called Wireless Kerberos (W-Kerberos), is based on the Kerberos authentication server and the IEEE 802.1X-EAP model, in order to satisfy both security and mobility needs. It then, pro...

متن کامل

AAA Architecture for WLAN over IPv6

Internet applications over the becoming standard IPv6 network have been increased significantly. Together with the rapid growth of mobile devices, a secure wireless IPv6 environment is needed. Current security methods, including EAP, 802.1x, Radius, etc., are still inadequate. In this paper, we study the security issues of IPv6, and its threats in the wireless environment, and propose an AAA (A...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008