AAA and Network Security for Mobile Access: Radius, by Madjid Nakhjiri

By Madjid Nakhjiri

Even though an intensive remedy of the entire correct features of the marketed components of community safety, the English is undesirable adequate to be ambiguous and distracting and plenty of areas. A instructed paintings if the reader is ready to wait and see and diligent with the awkward use of the English language.

Show description

Read or Download AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility PDF

Best networking books

Vehicular Networks: From Theory to Practice (Chapman & Hall/CRC Computer & Information Science Series)

In spite in their value and capability societal influence, there's presently no complete resource of data approximately vehicular advert hoc networks (VANETs). Cohesively integrating the state-of-the-art during this rising box, Vehicular Networks: From concept to perform elucidates many concerns interested by vehicular networking, together with site visitors engineering, human components reviews, and novel laptop technology research.

Divided into six wide sections, the ebook starts with an summary of site visitors engineering concerns, reminiscent of site visitors tracking and site visitors circulate modeling. It then introduces governmental and business efforts within the usa and Europe to set criteria and practice box checks at the feasibility of vehicular networks. After highlighting cutting edge functions enabled via vehicular networks, the publication discusses numerous networking-related matters, together with routing and localization. the subsequent part specializes in simulation, that is at the moment the first process for comparing vehicular networking platforms. the ultimate half explores the level and impression of driving force distraction with in-vehicle displays.

Encompassing either introductory and complicated options, this consultant covers many of the components that effect the layout of functions for vehicular networks. It info key examine demanding situations, bargains tips on constructing destiny criteria, and offers important info on present experimental studies.

Additional info for AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility

Example text

The responder also includes an optional token identifier (TokenID) along with the token in its response to initiator. The initiator receives the RB and creates a random challenge (RA) of its own and takes the two random numbers along with the name of entity B, and optionally other useful data as part of its own token (TokenRI). The token also includes a signature of all that information with the private key of the initiator. The initiator creates a message and includes its public key certificate (Cert I) to the message, so that the responder can verify the signature.

AAA protocol at NAS must support at least the RADIUS attribute set. The AAA protocol must provide mutual authentication between AAA server and NAS. At minimum, the AAA protocol should support use of shared secrets between NAS and AAA servers and avoid using the same shared secret for all NASs. More details on this will be provided in Chapter 6. The AAA protocol must also support public key infrastructure (PKI)-based methods for mutual verification of identity (authentication). We will discuss PKIs in Chapter 9.

At minimum, the AAA protocol should support use of shared secrets between NAS and AAA servers and avoid using the same shared secret for all NASs. More details on this will be provided in Chapter 6. The AAA protocol must also support public key infrastructure (PKI)-based methods for mutual verification of identity (authentication). We will discuss PKIs in Chapter 9. Some attributes (application specific information) may need to be encrypted. The AAA protocol must support selective encryption of attributes on an attribute-by-attribute basis.

Download PDF sample

Rated 4.19 of 5 – based on 22 votes

About the Author

admin