Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 09
AAA: a survey and a policy-based architecture and framework
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
For providing seamless and secure multimedia service in Wireless network, the protocol needs, efficient design, security and reduction in authentication time when a mobile user move to an other domain (Foreign domain). This paper presents an authentication and authorization infrastructure based on AAA (Authentication, Authorization, and Accounting) to minimize the authentication delay when mobile users move between different domains in wireless networks. In this paper, an AAAH (Home network) and SCC(Security Contest Controller) hierarchy infrastructure were used. A mobile user stores information of SCCs in which the mobile user has been visited. For re-authentication, a mobile user sends the service request and information to the new SCC and it finds the shortest path. Then the new SCC gets security context from the shortest path.