Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2006.13C.3.359

A Study on PIN-based Authentication and ID Registration by Transfer in AAA System  

Kang Seo-Il (순천향대학교 전산학과)
Lee Im-Yeong (순천향대학교 컴퓨터학부)
Abstract
AAA(Authentication, Authorization, Accounting) is the service that offers authentication, authorization, and accounting method, and every terminal that accesses the network requires this AAA service. The authentication process of a mobile terminal is as follows: a mobile phone accesses an authentication server in a home network via the authentication service in an external network, which receives the authentication result. And, for the home authentication server to offer secure service, a unique key is distributed for the secure communication between the external agent and the user, the external agent and the home authentication server, and the user and the home authentication server. This paper discusses and proposes the key distribution for secure communication among external authentication servers when a mobile terminal travels to an external network. As the proposed method does not require the home authentication server to reissue another authentication when a user travels to other external networks, it reduces the overload in the home authentication server. It can also distribute a PIN-driven key.
Keywords
AAA; Authentication; Password; ID Registration; PIN(Personal Identity Number);
Citations & Related Records
연도 인용수 순위
  • Reference
1 IEEE Standard 802.lX -2001. IEEE Standard for Local and metroplitan area networks-Port-Based Network Access Control. June. 2001
2 IEEE Standard P802.11i/D10.0 Medium Access Control Security Enhancements, Amendment 6 to IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11 Wireless Medium Access Control and Physical Layer Specifications. April. 2004
3 http://www.isaac.cs.berkele.edu/isaac/wep-faq.html, insecurity of the WEP algorithm
4 진봉재, 허의남, 문영성, 'IEEE802.11 무선랜 기반의 Mobile IPv6 AAA환경세서 핸드오버 최적화 방안 연구', 한국정보처리학회 2004년 추계학술대회, pp.1201-1204
5 C. Rigney, S. Willens, A. Rubens and W. Simpson, 'Remote Authentication dial In User Service(RADIUS),' RFC 2865
6 P. Calhoun, J Loughney, E. Guttman, G. Zorn and J Arkko, 'Diameter Base Protocol,' RFC 3588
7 F. Johansson and T.Johansson, 'Mobile IPv4 Extension for Carrying Network Access Identifiers,' RFC 3846
8 J, Vollbrecht, P. calhoun, S. Farrell, L. Gommans, G. Gross, B. de Bruihjn, C.de Laat, M. Holdrege and D.Spence, 'AAA Authorization Application Examples,' RFC 2905
9 J, Vollbrecht, P. calhoun, S. Farrell, L. Gommans, G. Gross, B. de Bruihjn, C.de Laat, M. Holdrege and D.Spence, 'AAA Authorization Framework,' RFC 2904
10 P. Hoffman, 'Algorithuns for Internet Key Exchange version 1,' RFC 2409
11 T. Dierks and c. Allen 'The TLS Protocol Version 1.0,' RFC 2246
12 S.patel, 'Weaknesses of north american wireless authentication protocol,' IEEE Wireless Communications, Vol.4, No.3, June. 1997   DOI   ScienceOn
13 Qiang Tang, J.Mitchell, 'On the security of some password-based key agreement schemes,' Cryptology ePrint Archive, 2005.
14 I.Artur Hecker, Houda Labiod, Ahmed Serhrouchnei 'Authentis : Trhrough Incremental Authentication Models to Secure Interconnected Wi-Fi WLANs,' ASWN2002
15 Yu Chen, Terrance Boult, 'Dynamic Home Agent Reassignment in Mobile IP,' IEEE-WCNC02, 2002   DOI
16 이효성, 김기천, 김인수 'Mobile 환경에서의 AAA 지역 등록 인증 개선 방안', 한국정보처리학회 2004년 추계학술대회, pp.1267-1270