Delegated Validation System for Secure Authentication in WLAN Roaming
スポンサーリンク
概要
- 論文の詳細を見る
Rapid deployment of wireless technology has led to rapid growth of Wireless LAN (WLAN). Since workforce is becoming increasingly mobile, roaming across WLAN infrastructures, which gives attractive features both for user and service provider, is required. However, some issues are impeding further adoption of the technology, in particular insufficient security protection for authentication data exchange between different domains that vulnerables to attack. Therefore, we propose secure authentication system for WLAN roaming based on digital certificate combined with delegated validation system. In our scheme, a user is authenticated by presenting an X.509 identity certificate. Then service provider will grant or deny the user's access request by delegating the validation process of certificate to specific validation-server. Although our system requires a user to have digital certificate, it can prevent all the security threats listed above. Moreover, it also provides a basis for independent model of WLAN roaming.
- 一般社団法人情報処理学会の論文
- 2004-01-28
著者
-
YAMAGUCHI Suguru
Graduate School of Information Scinece, Nara Institute of Science and Technology
-
Okuda Takeshi
Graduate School of Information Science, Nara Institute of Science and Technology
-
Yamaguchi Suguru
Graduate School Of Information Science Nara Institute Of Science And Technology
-
Okuda Takeshi
Graduate School Of Information Science Nara Institute Of Science And Technology
-
Yamaguchi S
Graduate School Of Information Science Nara Institute Of Science And Technology
-
ADIKUSUMA Yan
Graduate School of Information Science, Nara Institute of Science and Technology
-
Adikusuma Yan
Graduate School Of Information Science Nara Institute Of Science And Technology
関連論文
- Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries
- Reducing Processor Usage on Heavily-Loaded Network Servers with POSIX Real-Time Scheduling Control(System Programs)
- Basic Trust Calculation to Prevent Spam in VoIP Network based on Call Duration : Single Hop Consideration
- Performance Study and Deployment Strategies on the Sender-Initiated Multicast(Internet Technology V)
- Multi-Path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks(Mobile Networking)(Internet Technology IV)
- Proposal for Adaptive Bandwidth Allocation Using One-Way Feedback Control for MPLS Networks(Switching for Communications)
- Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries
- Preliminary Field-Trial for QoS Routing and Dynamic SLA (Special Issue on Internet Technology)
- Special Issue on Internet Technology III
- Special Issue on Internet Technology
- Proactive AP Selection Method Considering the Radio Interference Environment
- Improvement of Consistency among AS Policies in IRR Databases(Distributed System Operation and Management)
- LI_015 Region Extraction with Cooperative Active Contours
- Special Section on Internet Technology IV
- Delegated Validation System for Secure Authentication in WLAN Roaming
- Delegated Validation System for Secure Authentication in WLAN Roaming
- Cached Shortest-Path Tree : An Approach to Reduce the Influence of Intra-Domain Routing Instability(Network)
- Cached Shortest-Path Tree : An Approach to Reduced the Influence of Intra-Domain Routing Instability
- Lightweight Vulnerability Management System
- Lightweight Vulnerability Management System
- Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs
- An Implementation Design of a WLAN Handover Method Based on Cross-Layer Collaboration for TCP Communication
- Improvement of Consistency among AS Policies in IRR Databases