Skip to main content

PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access

  • Conference paper
Information Security Applications (WISA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2908))

Included in the following conference series:

Abstract

Currently there are no Internet access authentication protocols available that support both symmetric and asymmetric cryptographic techniques, can be carried over arbitrary access networks, and are flexible enough to be re-used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/IKEv2 authentication protocol for heterogeneous network access as a step towards filling this gap. A security analysis of the PANA/IKEv2 protocol is also provided. This article aims primarily at contributing to the design of authentication protocols suitable for use in future heterogeneous Internet access environments supporting ubiquitous mobility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Guenther, C.: Pioneering advanced mobile privacy and security (PAMPAS) refined roadmap. Deliverable D03 IST-2001-37763, PAMPAS Project (February 2003), http://www.pampas.eu.org/

  2. Institute of Electrical and Electronics Engineers. IEEE P802.1aa/D5-2003 DRAFT Standard for Local and Metropolitan Area Networks - Port Based Network Access Control - Amendment 1: Technical and Editorial Corrections (February 2003)

    Google Scholar 

  3. Simpson, W.: The point-to-point protocol (PPP). Request For Comments 1661 (STD 51), Internet Engineering Task Force (July 1994)

    Google Scholar 

  4. Forsberg, D., Ohba, Y., Patil, B., Tschofenig, H., Yegin, A.: Protocol for carrying authentication for network access (PANA). Internet draft (work in progress), Internet Engineering Task Force (July 2003)

    Google Scholar 

  5. Blunk, L., Vollbrecht, J., Aboba, B., Carlson, J., Levkowetz, H.: Extensible authentication protocol (EAP). Internet draft (work in progress), Internet Engineering Task Force (June 2003)

    Google Scholar 

  6. Tschofenig, H., Kroeselberg, D.: EAP IKEv2 method. Internet draft (work in progress), Internet Engineering Task Force (June 2003)

    Google Scholar 

  7. Kaufman, C. (ed.): Internet key exchange (IKEv2) protocol. Internet draft (work in progress), Internet Engineering Task Force (May 2003)

    Google Scholar 

  8. Harkins, D., Carrel, D.: The Internet key exchange (IKE). Request For Comments 2409, Internet Engineering Task Force (November 1998)

    Google Scholar 

  9. Blunk, L., Vollbrecht, J.: PPP extensible authentication protocol (EAP). Request For Comments 2284, Internet Engineering Task Force (March 1998)

    Google Scholar 

  10. Perlman, R.: Understanding IKEv2: Tutorial, and rationale for decisions. Internet draft (work in progress), Internet Engineering Task Force (February 2003)

    Google Scholar 

  11. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  12. Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. Request For Comments 3280, Internet Engineering Task Force (April 2002)

    Google Scholar 

  13. Asokan, N., Niemi, V., Nyberg, K.: Man-in-the-middle in tunnelled authentication. In: The Proceedings of the 11th International Workshop on Security Protocols, Cambridge, UK (April 2003) (to be published in the Springer-Verlag LNCS series)

    Google Scholar 

  14. Puthenkulam, J., Lortz, V., Palekar, A., Simon, D., Aboba, B.: The compound authentication binding problem. Internet draft (work in progress), Internet Engineering Task Force (October 2002)

    Google Scholar 

  15. Hiller, T., Zorn, G.: Diameter extensible authentication protocol (EAP) application. Internet draft (work in progress), Internet Engineering Task Force (March 2003)

    Google Scholar 

  16. Calhoun, P., Farrell, S., Bulley, W.: Diameter CMS security application. Internet draft (work in progress), Internet Engineering Task Force (March 2002)

    Google Scholar 

  17. Aboba, B., Simon, D.: EAP keying framework. Internet draft (work in progress), Internet Engineering Task Force (March 2003)

    Google Scholar 

  18. Palekar, A., Simon, D., Zorn, G., Josefsson, S.: Protected EAP protocol (PEAP). Internet draft (work in progress), Internet Engineering Task Force (March 2003)

    Google Scholar 

  19. Haverinen, H., Salowey, J.: EAP SIM authentication. Internet draft (work in progress), Internet Engineering Task Force (February 2003)

    Google Scholar 

  20. Aboba, B., Beadles, M.: The network access identifier. Request For Comments 2486, Internet Engineering Task Force (January 1999)

    Google Scholar 

  21. Parthasarathy, M.: PANA threat analysis and security requirements. Internet draft (work in progress), Internet Engineering Task Force (April 2003)

    Google Scholar 

  22. Parthasarathy, M.: Securing the first hop in PANA using IPsec. Internet draft (work in progress), Internet Engineering Task Force (May 2003)

    Google Scholar 

  23. Eastlake III, D., Crocker, S., Schiller, J.: Randomness recommendations for security. Request For Comments 1750, Internet Engineering Task Force (December 1994)

    Google Scholar 

  24. Salowey, J., Eronen, P.: EAP key derivation for multiple applications. Internet draft (work in progress), Internet Engineering Task Force (June 2003)

    Google Scholar 

  25. ETSI. GSM Technical Specification GSM 04.08 (ETS 300 940): “Digital cellular telecommunication system (Phase 2+); Mobile radio interface layer 3 specification” (version 7.8.0). European Telecommunications Standards Institute (June 2000)

    Google Scholar 

  26. Buckley, A., Satarasinghe, P., Alperovich, V., Puthenkulam, J., Walker, J., Lortz, V.: EAP SIM GMM authentication. Internet draft (work in progress), Internet Engineering Task Force (August 2002)

    Google Scholar 

  27. Walker, J., Housley, R.: The EAP Archie protocol. Internet draft (work in progress), Internet Engineering Task Force (February 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pagliusi, P.S., Mitchell, C.J. (2004). PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. In: Chae, KJ., Yung, M. (eds) Information Security Applications. WISA 2003. Lecture Notes in Computer Science, vol 2908. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24591-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24591-9_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20827-3

  • Online ISBN: 978-3-540-24591-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics