ITU Q.3202.1:2008

ITU Q.3202.1:2008 Authentication Protocols Based On Eap-aka For Interworking Among 3gpp, Wimax, And Wlan In Ngn Purpose is to apply the EAP-AKA protocol to non-3GPP network devices not equipped with UICC for interworking among 3GPP, WiMax, and WLAN in NGN.

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$17.53 tax incl.

$39.83 tax incl.

(price reduced by 56 %)

1000 items in stock

Table of Contents

1Scope
1.1Relationship
2References
3Abbreviations
4SecurityRequirementsforAuthenticationInterworking
5Networkarchitectureforaccessauthenticationinterworking
inNGN
6AuthenticationprotocolsbasedonEAP-AKAforheterogeneous
accessauthentication
7Securityconsiderations
AppendixI-Exampleauthenticationinheterogeneousenvironments
I.1ExampleusingEAP-AKAwithUICCauthenticationmechanism
I.2ExampleusingEAP-AKAbasedonapasswordandthe
Diffie-Hellmanalgorithm
I.3Exampleoffastre-authenticationprocedure
Bibliography

Abstract

Purpose is to apply the EAP-AKA protocol to non-3GPP network devices not equipped with UICC for interworking among 3GPP, WiMax, and WLAN in NGN.

Contact us