Authentication Processing Optimization Model for the EAP-MD5 AAAv6 Operation


The KIPS Transactions:PartC, Vol. 12, No. 5, pp. 757-764, Oct. 2005
10.3745/KIPSTC.2005.12.5.757,   PDF Download:

Abstract

With the increasing service quality and security in the Mobile Internet, Diameter technology based on the AAAv6 is being used the user authentication. But there are some problems on the authentication procedures of the Diameter in which the security falls down from a loaming service or Internet trasmission course. We combine it with the Cipher algoruthm like EAP-MD5 and accomplish a user authentication processing. If we want to supply the user authentication with the mobility among domains by AAAv6-based Diameter, we need the efficient capacity allocation among AAA attendent, AAAv, AAAb, AAAh, HA servers in the AAAv6. Therefore in this paper, we propose to make the authentication capacity index to carry outuser authentication ability by analyzing an EAP-MD5 server capacity model of AAAv6 authentication models for users with mobility among domains, and to find the optimized condition for the AAAv6 capacity by the index.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
Y. S. Jeong, S. H. Woo, S. H. Lee, "Authentication Processing Optimization Model for the EAP-MD5 AAAv6 Operation," The KIPS Transactions:PartC, vol. 12, no. 5, pp. 757-764, 2005. DOI: 10.3745/KIPSTC.2005.12.5.757.

[ACM Style]
Yoon Su Jeong, Sung Hee Woo, and Sang Ho Lee. 2005. Authentication Processing Optimization Model for the EAP-MD5 AAAv6 Operation. The KIPS Transactions:PartC, 12, 5, (2005), 757-764. DOI: 10.3745/KIPSTC.2005.12.5.757.