Extensible Authentication (EAP) Protocol Integrations in the Next Generation Cellular Networks

Author(s):  
Sasan Adibi ◽  
Gordon B. Agnew

Authentication is an important part of the authentication authorization and accounting (AAA) schemes and the extensible authentication protocol (EAP) is a universally accepted framework for authentication commonly used in wireless networks and point-to-point protocol (PPP) connections. The main focus of this chapter is the technical details to examine how EAP is integrated into the architecture of next generation networks (NGN), such as in worldwide interoperability for microwave access (WiMAX), which is defined in the IEEE 802.16d and IEEE 802.16e standards and in current wireless protocols, such as IEEE 802.11i. This focus includes an overview of the integration of EAP with IEEE 802.1x, remote authentication dial in user service (RADIUS), DIAMETER, and pair-wise master key version (2PKv2).

Author(s):  
Manuel Mogollon

Unless a corporation can reliably authenticate its network users, it is not possible to keep unauthorized users out of its networks. Authentication is essential for two parties to be able to trust in each other’s identities. Authentication is based on something you know (a password), on something you have (a token card, a digital certificate), or something that is part of you (fingerprints, voiceprint). A strong authentication requires at least two of these factors. The following mechanisms of authentication are described in this chapter: (1) IEEE 802.1X Access Control Protocol; (2) Extensible Authentication Protocol (EAP) and EAP methods; (3) traditional passwords; (4) Remote Authentication Dial-in Service (RADIUS); (5) Kerberos authentication service; and (6) X.509 authentication.


2011 ◽  
Vol 145 ◽  
pp. 204-208
Author(s):  
Hsia Hung Ou ◽  
Hao Hsiang Ku ◽  
Te Yu Chen

Extensible Authentication Protocol (EAP) is a universal authentication framework defined by RFC3748 and updated by RFC5247. It is not a specific authentication mechanism for exclusive system and then the widespread acceptance and implementation in wireless networks or other Point-to-Point (P2P) connections. A number of vendor specific EAP methods were proposed for special purpose such as EAP-MD5, EAP-TLS, EAP-TTLS, EAP-PEAP, LEAP, SPEKE, EAP-SIM, EAP-AKA, EAP-FAST, and so on. All of them have a common characteristic that the client submitted his Security Association (SA) to the neighbor Access Point (AP), then AP forward it to identify his validity by Authentication Authorization Accounting (AAA) server of both sides. Although these EAPs are design to meet the widespread authentication demands. But in fact they have the independent authentication procedure respectively. That is they are incompatible with each other. For mobile devices, in order to meet the needs of different connection it had to support many of the EAPs. This situation for the most mobile devices is a heavy load and result the inconvenient which move in the different service network. This paper devotes in solves this situation. For this goal, an extensible authentication protocol for mobile equipment to heterogeneous network (EAP-M2H) is provided in the paper. EAP-M2H development from the EAP-AKA and improve their applicability and compatibility in heterogeneous network.


2015 ◽  
Vol 22 (5) ◽  
pp. 90-97 ◽  
Author(s):  
Jingchu Liu ◽  
Shugong Xu ◽  
Sheng Zhou ◽  
Zhisheng Niu

2008 ◽  
Vol 5 (2) ◽  
pp. 18-29
Author(s):  
Ralf Kaumanns ◽  
Veit A. Siegenheim

Kommunikationsnetzbetreiber suchen aufgrund der kontinuierlichen Preiserosion nach neuen Umsatzquellen. Neben den Perspektiven mobiler Datendienste setzen sie auf die Möglichkeiten neuer Kommunikationsnetze unter dem Schlagwort Next Generation Networks (NGN), um unter anderem die Servicequalität (Dienstgütequalität) definieren zu können. Hierzu müsste allerdings die bestehende Netzneutralität, die eine diskriminierungsfreie Übermittlung von Daten sicherstellt, abgeschafft werden. Diese Ambitionen stellen für Google eine signifikante Bedrohung seines Geschäftsmodells und seines unternehmerischen Erfolgs dar. Google hat in den letzten Jahren mit verschiedenen Investitionen, Beteiligungen und Akquisitionen auf der Ebene der Infrastruktur, der Endgeräte und der Anwendungen auf diese Bedrohung reagiert. Dabei handelt es sich nicht nur um eine reine Konterstrategie, sondern Google versucht damit, sein erfolgreiches Geschäftsmodell auf die Telekommunikation und hier insbesondere auf die Mobilfunknetze auszudehnen. Im Erfolgsfall könnte dies signifikante Veränderungen im Geschäftsmodell der Telekommunikationsunternehmen zur Folge haben.


2010 ◽  
Vol 56 (2) ◽  
pp. 117-124 ◽  
Author(s):  
Mosiuoa Tsietsi ◽  
Alfredo Terzoli ◽  
George Wells

Using JAIN SLEE as an Interaction and Policy Manager for Enabler-based Services in Next Generation Networks The IP Multimedia Subsystem is a telecommunications framework with a standard architecture for the provision of services. While the services themselves have not been standardised, standards do exist for basic technologies that can be re-used and aggregated in order to construct more complex services. These elements are called service capabilities by the 3GPP and service enablers by the OMA, both of which are reputable standards bodies in this area. In order to provide re-usability, there is a need to manage access to the service capabilities. Also, in order to build complex services, there is a further need to be able to manage and coordinate the interactions that occur between service capabilities. The 3GPP and the OMA have separately defined network entities that are responsible for handling aspects of these requirements, and are known as a service capability interaction manager (SCIM) and a policy enforcer respectively. However, the internal structure of the SCIM and the policy enforcer have not been standardised by the relevant bodies. In addition, as the SCIM and the policy enforcer have been defined through complementary yet separate processes, there is an opportunity to unify efforts from both bodies. This paper builds on work and standards defined by the bodies, and proposes the design of an interaction manager with features borrowed from both the SCIM and the policy enforcer. To help validate the design, we have identified a platform known as JAIN SLEE which we believe conforms to the model proposed, and we discuss how JAIN SLEE can be used to implement our ideas.


2017 ◽  
Vol 9 (1) ◽  
pp. 30-35
Author(s):  
Sunderi Pranata ◽  
Hargyo Tri Nugroho ◽  
Hirofumi Yamaki

It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device (SMS, token, authenticator). Implemented in small USB U2F device, FIDO U2F delivers easier yet stronger security on authentication process which implements public key cryptography, challenge-response protocol, and phishing and MitM protection.  Index Terms— Authentication protocol, FIDO U2F, Multi factor authentication, OTP


2011 ◽  
Author(s):  
Xin Zhang ◽  
Hsu-Chun Hsiao ◽  
Geoffrey Hasker ◽  
Haowen Chan ◽  
Adrian Perrig ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document