2005
DOI: 10.1002/0470017465
|View full text |Cite
|
Sign up to set email alerts
|

AAA and Network Security for Mobile Access

Abstract: For the road travelers in the United States, especially the parents who take their children in the family car on the long road trips, the letters AAA stand for a peace of mind. They feel that any time their car breaks down, they can call the number for the American Automobile Association and ask for roadside assistance. Even though this book is not about that sort of AAA, the 3 "A"s that we talk about here, when designed properly, can bring the same peace of mind to the network operator and its customers. Auth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0
2

Year Published

2007
2007
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(9 citation statements)
references
References 0 publications
0
7
0
2
Order By: Relevance
“…Network security refers to the term AAA (Authentication, Authorization and Accounting) to define the access control architectures. The AAA architectures normally consist of three entities: the user requesting the access, an Access Server at the network edge controlling access to the network and an AAA server that grants or denies the access based on the access credentials provided by the user [25]. The AAA architectures require a standardized protocol between the access server and the user information repository in the AAA server in order to exchange the access control related information.…”
Section: Access Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…Network security refers to the term AAA (Authentication, Authorization and Accounting) to define the access control architectures. The AAA architectures normally consist of three entities: the user requesting the access, an Access Server at the network edge controlling access to the network and an AAA server that grants or denies the access based on the access credentials provided by the user [25]. The AAA architectures require a standardized protocol between the access server and the user information repository in the AAA server in order to exchange the access control related information.…”
Section: Access Controlmentioning
confidence: 99%
“…The DIAMETER server is responsible for processing the request message, authentication of the user and returning the access parameters necessary for the DIAMETER client to deliver the services. Upon receiving the access request, the DIAMETER server carries the verification process locally and responds with: access denial, access granted with authorization parameters, or throws additional authentication queries to the user requesting the access [25]. Figure 2.6 presents a DIAMETER based access control setup, where the remote client Host-A requests a service in the private network and is being authenticated by the Network Access Server (NAS) and the Diameter Server, using the DIAMETER protocol.…”
Section: Diamater Protocolmentioning
confidence: 99%
“…The Diameter protocol was specified in 2003 to address the issues of previous AAA protocols such as TACACS+ or RADIUS 1 [18]. Although it was not designed as a generic AAA protocol, it possesses many of its properties [20], allowing extensions that go beyond the scope of network access such as bootstrapping [14].…”
Section: Introductionmentioning
confidence: 99%
“…IMS [3], [4], [17] is a standardized framework typically used by telecom operators to provide mobile and fixed multimedia services in an all IP environment. In order to Figure 1 Examples of multi-domain services provide authentication, authorization and accounting (AAA) services in IMS networks typically the AAA architecture and framework is used [5], [6]. The main challenge related to the use of the AAA architecture for multi-domain services, which is not previously described in literature, is the fact that the scenario where one user has several accounting relationships for one service that crosses multiple domains is not taken into account.…”
Section: Introductionmentioning
confidence: 99%