2005
DOI: 10.17487/rfc4016
|View full text |Cite
|
Sign up to set email alerts
|

Protocol for Carrying Authentication and Network Access (PANA) Threat Analysis and Security Requirements

Abstract: Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 4 publications
0
12
0
Order By: Relevance
“…Accordingly, several research works have been done to investigate the use of cryptographic techniques to achieve secure communication in WMNs. Cheikhrouhou et al have proposed a security architecture [104] that is suitable for multi-hop WMNs employing PANA (Protocol for carrying Authentication for Network Access) [105]. In the scheme proposed by the authors, the wireless clients are authenticated on production of the cryptographic credentials necessary to create an encrypted tunnel with the remote access router to which they are associated.…”
Section: Secure Authentication Mechanismsmentioning
confidence: 99%
“…Accordingly, several research works have been done to investigate the use of cryptographic techniques to achieve secure communication in WMNs. Cheikhrouhou et al have proposed a security architecture [104] that is suitable for multi-hop WMNs employing PANA (Protocol for carrying Authentication for Network Access) [105]. In the scheme proposed by the authors, the wireless clients are authenticated on production of the cryptographic credentials necessary to create an encrypted tunnel with the remote access router to which they are associated.…”
Section: Secure Authentication Mechanismsmentioning
confidence: 99%
“…In this design, extensible authentication protocol (EAP) notification is transmitted between the client and (WLAN) port. Protocol for carrying authentication for network access (PANA) (Parthasarathy, 2005) was developed later for multihop traffic access. It offers authentication similar to IEEE 802.1X and it is independent of the underlying access technologies.…”
Section: Authenticationmentioning
confidence: 99%
“…Certain types of service theft are possible when the DI is not protected during or after the PANA exchange [RFC4016]. PANA MUST have the capability to exchange DI securely between the PaC and PAA where the network is vulnerable to man-in-the-middle attacks.…”
Section: Enforcement Point (Ep)mentioning
confidence: 99%
“…The DI can be carried either explicitly as part of the PANA payload, or implicitly as the source of the PANA message, or both. Multi-access networks also require use of a cryptographic protection along with DI filtering to prevent unauthorized access [RFC4016]. The keying material required by the cryptographic methods needs to be indexed by the DI.…”
Section: Identifiersmentioning
confidence: 99%
See 1 more Smart Citation