An Effective Authentication Procedure Considering User Expiry Time During Handover
暂无分享,去创建一个
This paper describes an approach to authentication during handover. In order to reduce the authentication delay, information is shared between users and the targeted network using two hash-chains. Users who are likely to change networks are assigned an expiration time. Therefore, in order to apply the new approach to a real environment, we propose `pre-auth' type in the extensible authentication protocol (EAP) authentication process to utilize the authentication information. The new approach offers a solution that reduces the authentication delay without reducing the security level of the system
[1] William Allen Simpson,et al. The Point-to-Point Protocol (PPP) , 1993, RFC.
[2] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[3] William A. Arbaugh,et al. Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.
[4] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[5] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.