Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

An IKEv2-Based Hybrid Authentication Scheme for Simultaneous Access Network and Home Network Authentication

Authors
Ko, MyeongJiKim, HyogonMin, Sung-Gi
Issue Date
2월-2022
Publisher
IEICE-INST ELECTRONICS INFORMATION COMMUNICATION ENGINEERS
Keywords
authentication; EAPOL; IKEv2; EAP
Citation
IEICE TRANSACTIONS ON COMMUNICATIONS, v.E105B, no.2, pp.250 - 258
Indexed
SCIE
SCOPUS
Journal Title
IEICE TRANSACTIONS ON COMMUNICATIONS
Volume
E105B
Number
2
Start Page
250
End Page
258
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/140124
DOI
10.1587/transcom.2021EBP3066
ISSN
0916-8516
Abstract
To access Internet services supported in a home network, a mobile node must obtain the right to use an access network, and it must be able to contact a home network gateway to access the Internet in the home network. This means that the device must be authenticated by an AP to use the access network, and it must additionally be authenticated by the home network gateway to access its home network. EAP-PEAP is currently the most commonly used authentication protocol in access networks, and IKEv2 is common security protocol for mutual authentication on the Internet. As the procedures in EAP-PEAP and IKEv2 are quite similar, EAP-PEAP can be replaced by IKEv2. If the access network authentication uses IKEv2-based protocols and the home network authentication also uses IKEv2, the IKEv2 messages exchanged in each authentication become duplicated. However, it should be noted that EAP-IKEv2 is not able to carry EAP exchanges. We propose a hybrid authentication mechanism that can be used to authenticate a mobile node for both networks simultaneously. The proposed mechanism is based on the IKEv2-EAP exchanges instead of the EAP exchanges currently used to authenticate the access network, but our scheme adopts the encapsulation method defined by EAP-IKEv2 to transport the IKEv2 message over IEEE 802.11 so as not to change the current access network authentication architecture and the message format used by the authentication protocols. The scheme authenticates both networks through a single IKEv2 authentication, rather than two authentication procedures - one for the access network and one for the home network. This reduces the number of exchanged messages and authentication time.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Min, Sung Gi photo

Min, Sung Gi
컴퓨터학과
Read more

Altmetrics

Total Views & Downloads

BROWSE