Dear All
 
 
 

I am going to implement ppp authentication for mobile IPv6 communication. I have implemented EAP ( MD5-Challenge ).

But i am not able to understand about AKA , How can i use PPP message format with AKA? If it is like EAP what is protocol field and length and optional field.

USIM will work like a client .what should be the fuctionality of authenticator(server)?

 

 

The use of the AKA also as a secure PPP authentication method in devices that already contain an USIM.

AKA typically runs in a UMTS Subscriber Identity Module (USIM), a smart card like device.

Five security feature groups are defined. Each of these feature groups meets certain threats and accomplishes certain security objectives:

- Network access security : the set of security features that provide users with secure access to 3G services, and which in particular protect against attacks on the (radio) access link;

- Network domain security: the set of security features that enable nodes in the provider domain to securely exchange signalling data, and protect against attacks on the wireline network;

- User domain security : the set of security features that secure access to mobile stations;

- Application domain security : the set of security features that enable applications in the user and in the provider domain to securely exchange messages;

- Visibility and configurability of security (V): the set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

 

 
 
 
 
 
Thanks
 
 
Regards
Anurag Uxa
iWave systems Technologies Pvt. Ltd.
Bangalore
ph.6786243/5 extn :205
 


DISCLAIMER: This e-mail and any attachment (s) is for authorised use by the intended recipient (s) only. It may contain proprietary material, confidential information and/or be subject to the legal privilege of iWave Systems Technologies Private Limited. If you have received this message in error, please notify the originator immediately. If you are not the intended recipient, you are notified that you are strictly prohibited from retaining, using, copying, alerting or disclosing the content of this message. Thank you for your co-operation.


Reply via email to