2008
DOI: 10.17487/rfc5193
|View full text |Cite
|
Sign up to set email alerts
|

Protocol for Carrying Authentication for Network Access (PANA) Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…This pre-authentication can take place in both layers 2 and 3. With MPA, an MH establishes a security association with the new network via its existing network connection using the protocol for carrying authentication and network access (PANA) [14] to obtain configuration information that will allow it to participate in the new network. Furthermore, a bidirectional tunnel is established between the MH and the access router (AR) of the new network for communication.…”
Section: Pre-authenticationmentioning
confidence: 99%
“…This pre-authentication can take place in both layers 2 and 3. With MPA, an MH establishes a security association with the new network via its existing network connection using the protocol for carrying authentication and network access (PANA) [14] to obtain configuration information that will allow it to participate in the new network. Furthermore, a bidirectional tunnel is established between the MH and the access router (AR) of the new network for communication.…”
Section: Pre-authenticationmentioning
confidence: 99%
“…For reasons described in Section 3 of [RFC5193], the PaC may need to reconfigure the IP address after a successful authentication and authorization phase to obtain an IP address that is usable for exchanging data traffic through EP. In this case, the PAA sets the 'I' (IP Reconfiguration) bit of PANA-Auth-Request messages in the authentication and authorization phase to indicate to the PaC the need for IP address reconfiguration.…”
Section: Pac-initiated Sessionmentioning
confidence: 99%
“…The authors of MIRON have however proposed in [22] an approach for handling nesting but that is achieved by supplementing the original MIRON proposal with third party protocols such as PANA protocol [23] and DHCPv6 [5] adding complexity to Visit MN (VMN) and MR and complicating the whole NEMO protocol and NEMO network infrastructure.…”
Section: Related Work and Motivationmentioning
confidence: 99%