Title :
Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography
Author :
Lee, Byung-Gil ; Choi, Doo-Ho ; Kim, Hyun-Gon ; Sohn, Seoung-Won ; Park, Kil-Houm
Author_Institution :
Network Security Dept., ETRI, Daejeon, South Korea
fDate :
23 Feb.-1 March 2003
Abstract :
The Mobile IP application of AAA (Diameter protocol) provides authentication, authorization, and accounting (AAA) services to a mobile ISP network for achieving legitimate mobility using e-mail-styled NAI and MAC valued keys in wireless IP access. In the rapidly expanding mobile environment, the introduction of identity-based cryptographic schemes has many advantages ranging from easy migration to public key cryptography. Accordingly, the current paper proposes a secure wireless Internet roaming service and WLAN service using identity(ID)-based cryptography. To support secure Mobile IP authentication between a mobile node and the authentication server, Mobile IP with an AAA protocol of mutual authentication is proposed using an ID-based signature scheme instead of a conventional MAC valued, symmetric, and single authentic protocol. Furthermore, the proposed protocol can also be implemented using algorithms based on elliptic curves.
Keywords :
Internet; access protocols; accounting; cryptography; electronic mail; land mobile radio; message authentication; mobile computing; telecommunication security; transport protocols; wireless LAN; AAA authentication protocol; AAA protocol; Diameter protocol; ID-based signature; Mobile IP; Mobile IP authentication; WLAN; WLAN service; algorithms; authentication authorization accounting services; authentication server; e-mail-styled MAC valued keys; e-mail-styled NAI valued keys; elliptic curves; identity-based cryptographic cryptography; identity-based cryptography; mobile ISP network; mobile environment; mobile node; mutual authentication; public key cryptography; secure wireless Internet roaming service; wireless IP access; Access protocols; Authentication; Communication system security; Cryptographic protocols; Elliptic curve cryptography; Identity-based encryption; Media Access Protocol; Public key cryptography; Wireless LAN; Wireless application protocol;
Conference_Titel :
Telecommunications, 2003. ICT 2003. 10th International Conference on
Print_ISBN :
0-7803-7661-7
DOI :
10.1109/ICTEL.2003.1191477