Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.4.11

A Study on Network Service Using Authorization Ticket in AAA system  

Kang, Seo-Il (Division of Computer, Soonchunhyang University)
Lee, Im-Yeong (Division of Computer, Soonchunhyang University)
Abstract
A ubiquitous network environment is a system where the user can avail of the network's services anytime, anywhere. To establish such an environment, studies continue being conducted on wireless communication technology and mobile terminals. The company that provides such services should have an established system for authentication, authorization and charging for users. This service is referred to as Authentication, Authorization, Accounting(AAA), and its aspects have been consistently studied. On the other hand, existing studies have been promoted with regard to the authentication and efficiency of the mobile terminal. One of the method is that the mobile terminal contacts to the home authentication server through the external authentication server every time it is required and; another one is to use a medium server to provide authentication in the middle between them. Thus, this study aims to determine the best method to use ticketing, where tickets are provided through a mobile terminal, complete with authentication and authorization features. Also, as it uses ticket, it can efficiently provide mobile verification processing.
Keywords
AAA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Qiang Tang, J.Mitchell, 'On the security of some password-based key agreement schemes', Cryptology ePrint Archive, pp.1-9, 2005
2 Yu Chen, Terrance Boult, 'Dynamic Home Agent Reassignment in Mobile IP', IEEEWCNC02, pp.44-48, 2002
3 이효성, 김기천, 김인수 'Mobile 환경에서의 AAA 지역 등록 인증 개선 방안', 한국정보처리학회 2004년 추계학술대회, pp1267-1270, 2004
4 Jung-Min Park, Eun-Hui Bae, Hye-Jin Pyeon, Kijoon Chae, 'A Ticket-Based AAA Security Mechanism in Mobile IP Network,' ICCSA 2003, pp.210-219, 2003
5 J. Vollbrecht, P. Calhoun, 'AAA Authorization Framework', RFC 2904, 2000.08
6 J. Vollbrecht, P. Calhoun, 'AAA Authorization Application Examples', RFC 2905, 2000. 08
7 I.Artur Hecker, Houda Labiod, Ahmed Serhrouchnei 'Authentis : Trhrough Incremental Authentication Models to Secure Interconnected Wi-Fi WLANs,' ASWN2002, 2002
8 S.patel, 'Weaknesses of north american wireless authentication protocol,' IEEE Wireless Communications, vol. 4, no. 3, June 1997
9 진봉재, 허의남, 문영성, 'IEEE802.11 무선랜 기반의 Mobile IPv6 AAA환경에서 핸드오버 최적화 방안 연구', 한국정보처리학회 2004년 추계학술대회, pp1201-1204, 2004
10 Yihong Zhou, Dapeng Wu and Scott M. Nettles, 'On the Architecture of Authentication, Authorization, and Accounting for Real- Time Secondary Market Services,' International Journal of Wireless and mobile computing, pp.1-8, Jan, 2005
11 F. Johansson, 'Mobile IPv4 Extension for Carrying Network Access Identifiers', RFC3846, 2004. 06
12 C. Rigney, S. Willens, A. Rubens, W. Simpson, 'Remote Authentication dial In User Service(RADIUS)', RFC 2865, 2000. 06