首页> 外文OA文献 >A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks
【2h】

A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks

机译:异构网络中的认证和密钥协商协议综述   网络

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Unlike current closed systems such as 2nd and 3rd generations where the corenetwork is controlled by a sole network operator, multiple network operatorswill coexist and manage the core network in Next Generation Networks (NGNs).This open architecture and the collaboration between different networkoperators will support ubiquitous connectivity and thus enhances users'experience. However, this brings to the fore certain security issues which mustbe addressed, the most important of which is the initial Authentication and KeyAgreement (AKA) to identify and authorize mobile nodes on these variousnetworks. This paper looks at how existing research efforts the HOKEY WG,Mobile Ethernet and 3GPP frameworks respond to this new environment and providesecurity mechanisms. The analysis shows that most of the research had realizedthe openness of the core network and tried to deal with it using differentmethods. These methods will be extensively analysed in order to highlight theirstrengths and weaknesses.
机译:与第二代和第三代等当前封闭系统不同,核心网络由唯一的网络运营商控制,多个网络运营商将共存并管理下一代网络(NGN)中的核心网络。这种开放式架构以及不同网络运营商之间的协作将支持无处不在连接性,从而增强用户体验。但是,这突显了必须解决的某些安全问题,其中最重要的是初始身份验证和密钥协议(AKA),用于识别和授权这些各种网络上的移动节点。本文着眼于HOKEY WG,移动以太网和3GPP框架的现有研究工作如何响应这种新环境并提供安全机制。分析表明,大多数研究已经意识到核心网络的开放性,并尝试使用不同的方法来处理它。为了突出它们的优点和缺点,将对这些方法进行广泛的分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号