Analysis of Handover Key Management schemes under IETF perspective

  • Authors:
  • R. Marin-Lopez;Y. Ohba;F. Pereniguez;A. F. Gomez

  • Affiliations:
  • Dept. Information and Communications Engineering (DIIC), University of Murcia, Facultad de Informatica, Campus de Espinardo S/N Murcia, Spain;Toshiba Corporate Research and Development Center, 1 Komukai-Toshiba-cho, Saiwai-ku Kawasaki, Kanagawa 212-8582, Japan;Dept. Information and Communications Engineering (DIIC), University of Murcia, Facultad de Informatica, Campus de Espinardo S/N Murcia, Spain;Dept. Information and Communications Engineering (DIIC), University of Murcia, Facultad de Informatica, Campus de Espinardo S/N Murcia, Spain

  • Venue:
  • Computer Standards & Interfaces
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Extensible Authentication Protocol (EAP) has been standardized within the Internet Engineering Task Force (IETF) in order to provide flexible mechanisms for authentication and key management for network access control. However, some deficiencies have been revealed and recognized as a major obstacle to achieving secure and seamless handover in mobile scenarios. HOKEY (Handover Keying) Working Group in IETF is standardizing low-latency EAP re-authentication and key distribution protocols to address these deficiencies. This paper provides a critical analysis of the on-going work.