Dynamic Authorization Proxying in the Remote Authentication Dial-In User Service (RADIUS) Protocol

2019 ◽  
Author(s):  
A. DeKok ◽  
J. Korhonen
Author(s):  
Said Zaghloul ◽  
Admela Jukan

The architecture, and protocols for authentication, authorization, and accounting (AAA) are one of the most important design considerations in third generation (3G)/fourth generation (4G) telecommunication networks. Many advances have been made to exploit the benefits of the current systems based on the protocol remote authentication dial in user service (RADIUS)protocol, and the evolution to migrate into the more secure, robust, and scalable protocol Diameter. Diameter is the protocol of choice for the IP multimedia subsystem (IMS) architecture, the core technology for the next generation networks. It is envisioned that Diameter will be widely used in various wired and wireless systems to facilitate robust and seamless AAA. In this chapter, we provide an overview of the major AAA protocols RADIUS and Diameter, and we discuss their roles in practical 1xEV-DO network architectures in the three major network tiers: access, distribution, and core. We conclude the chapter with a short summary of the current and future trends related to the Diameter-based AAA systems.


2003 ◽  
Author(s):  
M. Chiba ◽  
G. Dommety ◽  
M. Eklund ◽  
D. Mitton ◽  
B. Aboba

2008 ◽  
Author(s):  
M. Chiba ◽  
G. Dommety ◽  
M. Eklund ◽  
D. Mitton ◽  
B. Aboba

2009 ◽  
Vol 29 (4) ◽  
pp. 950-951
Author(s):  
Xin ZHANG ◽  
Fang-wei LI ◽  
Chun-lan PAN

Symmetry ◽  
2021 ◽  
Vol 13 (5) ◽  
pp. 855
Author(s):  
Tzung-Her Chen ◽  
Wei-Bin Lee ◽  
Hsing-Bai Chen ◽  
Chien-Lung Wang

Although digital signature has been a fundamental technology for cryptosystems, it still draws considerable attention from both academia and industry due to the recent raising interest in blockchains. This article revisits the subliminal channel existing digital signature and reviews its abuse risk of the constructor’s private key. From a different perspective on the subliminal channel, we find the new concept named the chamber of secrets in blockchains. The found concept, whereby the secret is hidden and later recovered by the constructor from the common transactions in a blockchain, highlights a new way to encourage implementing various applications to benefit efficiency and security. Thus, the proposed scheme benefits from the following advantages: (1) avoiding the high maintenance cost of certificate chain of certificate authority, or public key infrastructure, and (2) seamlessly integrating with blockchains using the property of chamber of secrets. In order to easily understand the superiority of this new concept, a remote authentication scenario is taken as a paradigm of IoT to demonstrate that the further advantages are achieved: (1) avoiding high demand for storage space in IoT devices, and (2) avoiding maintaining a sensitive table in IoT server.


Sign in / Sign up

Export Citation Format

Share Document