Chapter 2. Authentication

  1. Madjid Nakhjiri Researcher and Network Architect1 and
  2. Mahsa Nakhjiri Systems Engineer2

Published Online: 3 JAN 2006

DOI: 10.1002/0470017465.ch2

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility

How to Cite

Nakhjiri, M. and Nakhjiri, M. (2005) Authentication, in AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility, John Wiley & Sons, Ltd, Chichester, UK. doi: 10.1002/0470017465.ch2

Author Information

  1. 1

    Motorola Labs, USA

  2. 2

    Motorola Personal Devices, USA

Publication History

  1. Published Online: 3 JAN 2006
  2. Published Print: 9 SEP 2005

ISBN Information

Print ISBN: 9780470011942

Online ISBN: 9780470017463

SEARCH

Keywords:

  • authentication mechanisms;
  • Internet Architecture Board (IAB);
  • extensible authentication protocol (EAP);
  • message authentication code (MAC);
  • HMAC specification;
  • challenge/response authentication mechanism;
  • anonymous key exchange;
  • EAP messaging;
  • threat analysis

Summary

This chapter contains sections titled:

  • Examples of Authentication Mechanisms

  • Classes of Authentication Mechanisms

  • Further Resources

  • References