• Title/Summary/Keyword: AAA Server

Search Result 38, Processing Time 0.025 seconds

Design and Implementation of USIM Security Module for the Wireless Network Interworking (무선 네트워크 연동을 위한 USIM 보안 모듈 설계 및 구현)

  • Kim, Choon-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.41-49
    • /
    • 2007
  • USIM(UMTS Subscriber Identity Module) technology that accept 3GPP(3rd Generation Partnership Project) standards for information security supports security function in 3GPP. Supported security functions of USIM are confidentiality of user identity, mutual authentication and key agreement between end user and network, confidentiality of user data and data integrity. It is very important technology in wireless network. It makes secure environment that user and service provider can use securely mobile service in network. In this paper, design and implementation USIM security module that supports common network access method and authentication protocol in 3GPP and WLAN(Wireless LAN) and AAA (3A-Authentication Authorization Accounting) server system based RADIUS.

Design of Authentication Mechanism for Anonymity And Privacy assurance (익명성과 프라이버시 보장을 위한 효율적인 인증 메커니즘 설계)

  • Lee, Dong-Myung;Choi, Hyo-Min;Yi, Ok-Yeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.941-944
    • /
    • 2005
  • 본 논문에서는 인터넷을 통해 다양한 컨테츠 서비스를 사용자가 편리하게 이용할 수 있도록 EAP-TLS 인증 방식과 SKKE(Symmetric-Key Key Establishment)방식을 이용하여 보다 효율적인 인증 메커니즘을 설계하였다. 제안하고 있는 메커니즘에서는 사용자가 인증서 방식을 통해 AS(AAA Server)로부터 인증을 받으면 AS 와 가맹 관계에 있는 CP(Contents Provider)에는 별도의 로그인 과정없이 서비스를 이용할 수 있는 SSO 서비스, 사용자 익명성, 프라이버시를 제공한다. 사용자가 익명성을 필요로 하는 컨텐츠 서비스를 이용할 경우 사용자의 익명성을 보장 해주고 AS 모르게 사용자와 CP 가 안전하게 서비스를 전송하기 위해 사용 할 세션키를 교환하고 CP 마다 다른 세션키를 사용함으로써 사용자의 프라이버시를 보장해 준다.

  • PDF

Secure Group Management Protocol for IP-TV (IP-TV를 위한 안전한 그룹관리 프로토콜)

  • Kim, In-Hwan;Kim, Jung-Yoon;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1206-1209
    • /
    • 2007
  • IP-TV 서비스는 통신/방송 융합서비스로서 데이터 스트림이 송출되는 Server로부터 QoS가 보장되는 IP망을 통해 디지털 영상 방송이나 양방향 서비스를 가입자 단말까지 제공하는 서비스이다. IP-TV 서비스는 보안을 위해 CAS(Conditional Access System)를 사용하고, 또한 효율적인 콘텐츠의 전송을 위해 IP Multicast를 사용하게 된다. 보안 기능이 제공되지 않는 IP Multicast는 익명성을 허용하게 하여 eavesdropping, denial of service(DoS) Attack등이 가능하고, 또한 AAA(Authentication, Accounting, Authorization) 기능이 제공되지 않는다. IP-TV에서는 보안을 제공하기위해 Application 계층에서 CAS를 운용하게 되는데, 이는 Network계층에서 보안문제를 해결하는 것 보다 비효율적이다. 본 논문에서는 기존의 IGMP프로토콜을 확장, 개선하여 상호인증을 통해 CAS Server와 연계하여 IP-TV에 적합하게 만든 프로토콜을 제시함으로서, 이와 같은 문제점들을 해결하였다.

Authentication Processing Optimization Model for the EAP-MD5 AAAv6 Operation (EAP-MD5 AAAv6 운영을 위한 인증처리 최적화 모델)

  • Jeong, Yoon-Su;Woo, Sung-Hee;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.757-764
    • /
    • 2005
  • With the increasing service Qualify and security in the Mobile Internet Diameter technology based on the AAAv6 is being used in the user authentication. But there are some Problems on the authentication Procedures of the Diameter in which the security falls down from a loaming service or Internet transmission course. We combine it with the cipher algorithm like EAP-MD5 and accomplish a user authentication processing. If we want to supply the user authentication with the mobility among domains by AAAv6-based Diameter, we need the efficient capacity allocation among AAA attendent, AAAv, AhAb, AAAh, HA servers in the AAAv6. Therefore in this paper, we propose to make the authentication capacity index to carry out user authentication ability by analyzing an EAP-MD5S server capacity model of AAAv6 authentication models for users with mobility among domains, and to find the optimized condition for the AAAv6 capacity by the index.

AP and RADIUS server security and vulnerability analysis. (AP와 RADIUS서버 보안 및 취약점 분석)

  • Kim, Hyun Ho;Jang, WonTae;Jo, Jung Bok;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.241-244
    • /
    • 2013
  • These days wireless network devices (smartphones, tablet PC, laptop) are being utilized more frequently. In line with the increasing number of users of a wireless network, the usage of wireless access points is also increasing. Nowadays as nationwide wireless network services being made available, wireless networks are increasingly being used due to the lower costs of building faster and affordable private or carrier networks. However wireless security is not keeping up with this development. Many use open networks where anyone can join, meanwhile for those using wireless security protocols there is the problem of managing the password. In this paper, we analyze the problems of trying to build a user authentication system using an access point and the RADIUS server.

  • PDF

Implementation of Mobile IPv6 Fast Authorization for Real-time Prepaid Service (실시간 선불 서비스를 위한 모바일 IPv6 권한검증 구현)

  • Kim Hyun-Gon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.121-130
    • /
    • 2006
  • In next generation wireless networks, an application must be capable of rating service information in real-time and prior to initiation of the service it is necessary to check whether the end user's account provides coverage for the requested service. However, to provide prepaid services effectively, credit-control should have minimal latency. In an endeavor to support real-time credit-control for Mobile IPv6 (MIPv6), we design an implementation architecture model of credit-control authorization. The proposed integrated model combines a typical credit-control authorization procedure into the MIPv6 authentication procedure. We implement it on a single server for minimal latency. Thus, the server can perform credit-control authorization and MIPv6 authentication simultaneously. Implementation details are described as software blocks and units. In order to verify the feasibility of the proposed model. latency of credit-control authorization is measured according to various Extensible Authentication Protocol (EAP) authentication mechanisms. The performance results indicate that the proposed approach has considerably low latency compared with the existing separated models, in which credit-control authorization is separated from the MIPv6 authentication.

  • PDF

Secure Handover Using Inter-Access Point Protocol in Wireless LAN (무선 LAN에서 Inter-Access Point Protocol을 이용한 안전한 핸드오버)

  • DaeHun Nyang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.107-112
    • /
    • 2003
  • Handover in IEEE 802.11 requires repeated authentication and key exchange procedures, which are an obstacle to seamless services of wireless LAM. We propose a fast authentication and key exchange mechanism using IEEE 802.11f. Especially, by proposing a modified version of the 4-way handshake of IEEE 802.11i, we solve the perfect forward secrecy problem that arises when the pre-authentication is adopted. The scheme can be implemented only using the Context Block of IEEE 802.11f and the 4-way handshake of IEEE 802.11i without involving authentications server's interaction or non-standard behavior between access points. Our scheme is applicable to devices not supporting the us-authentication of IEEE 802.11i and also, it can substitute the pre-authentication when the pre-authentication is failed.

Authentication Mechanism for Secure Binding Update and Fast Handover in the Generalized Hierarchical MIPv6 (일반화된 계층적 MIPv6 환경에서의 안전한 바인딩 업데이트 및 Fast Handover를 위한 인증 메커니즘)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.107-115
    • /
    • 2008
  • In this paper, a secure and efficient binding update protocol as well as a handover protocol are proposed in the generalized hierarchical MIPv6 environment. Contrary to the conventional hierarchical MIPv6 environment where a foreign network is a small-scaled MAP domain, a large-scaled MAP domain consisting of several MAPs which are connected hierarchically is considered in the proposed protocol for the mechanism to support fast and secure mobility. It is also analyzed the security of the proposed protocol under the various attack scenarios.