PANA applicability in constrained environments
نویسندگان
چکیده
Constrained devices often have a need for access to a network for their intended services. They have some of the same security requirements for network access authentication as other network devices but the devices and environments that they operate within are quite different. These resource limited devices and the associated network environment pose additional challenges for adopting existing network access authentication protocol.
منابع مشابه
PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange informat...
متن کاملRFC 5193 PANA Framework
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document defines the general Protocol for Carrying Authentication for Network Access (PANA) framework functional elements, high-level call flow, and deployment environments.
متن کاملHeterogeneous Internet Access via PANA/UMTS
Currently there are no Internet access authentication protocols available that are lightweight, can be carried over arbitrary access networks, and are flexible enough to be re-used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/UMTS authentication protocol for heterogeneous network access as a step towards filling this gap. A security analysis of th...
متن کاملPANA/GSM Authentication for Internet Access
Currently there are no Internet access authentication protocols available that are lightweight, can be carried over arbitrary access networks, and are flexible enough to be used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/GSM authentication protocol for heterogeneous network access as a step towards filling this gap. A security analysis of the PA...
متن کاملPANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access
Currently there are no Internet access authentication protocols available that support both symmetric and asymmetric cryptographic techniques, can be carried over arbitrary access networks, and are flexible enough to be re-used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/IKEv2 authentication protocol for heterogeneous network access as a step tow...
متن کامل