AAA and Network Security for Mobile Access

AAA and Network Security for Mobile Access
Author :
Publisher : John Wiley & Sons
Total Pages : 318
Release :
ISBN-10 : 9780470017456
ISBN-13 : 0470017457
Rating : 4/5 (457 Downloads)

Book Synopsis AAA and Network Security for Mobile Access by : Madjid Nakhjiri

Download or read book AAA and Network Security for Mobile Access written by Madjid Nakhjiri and published by John Wiley & Sons. This book was released on 2005-11-01 with total page 318 pages. Available in PDF, EPUB and Kindle. Book excerpt: AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its protocols Diameter and Radius. The authors give an overview of established and emerging standards for the provision of secure network access for mobile users while providing the basic design concepts and motivations. AAA and Network Security for Mobile Access: Covers trust, i.e., authentication and security key management for fixed and mobile users, and various approaches to trust establishment. Discusses public key infrastructures and provides practical tips on certificates management. Introduces Diameter, a state-of-the-art AAA protocol designed to meet today’s reliability, security and robustness requirements, and examines Diameter-Mobile IP interactions. Explains RADIUS (Remote Authentication Dial-In User Services) and its latest extensions. Details EAP (Extensible Authentication Protocol) in-depth, giving a protocol overview, and covering EAP-XXX authentication methods as well as use of EAP in 802 networks. Describes IP mobility protocols including IP level mobility management, its security and optimizations, and latest IETF seamless mobility protocols. Includes a chapter describing the details of Mobile IP and AAA interaction, illustrating Diameter Mobile IP applications and the process used in CDMA2000. Contains a section on security and AAA issues to support roaming, discussing a variety of options for operator co-existence, including an overview of Liberty Alliance. This text will provide researchers in academia and industry, network security engineers, managers, developers and planners, as well as graduate students, with an accessible explanation of the standards fundamental to secure mobile access.


AAA and Network Security for Mobile Access Related Books

AAA and Network Security for Mobile Access
Language: en
Pages: 318
Authors: Madjid Nakhjiri
Categories: Technology & Engineering
Type: BOOK - Published: 2005-11-01 - Publisher: John Wiley & Sons

GET EBOOK

AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providi
AAA Identity Management Security
Language: en
Pages: 0
Authors: Vivek Santuka
Categories: Computers
Type: BOOK - Published: 2011 - Publisher: Pearson Education

GET EBOOK

AAA Identity Management Security presents a one-stop source for reliable, up-to-date information on Cisco AAA solutions.
Security in Distributed and Networking Systems
Language: en
Pages: 508
Authors: Yang Xiao
Categories: Computers
Type: BOOK - Published: 2007 - Publisher: World Scientific

GET EBOOK

Security issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in th
Network Security Technologies and Solutions (CCIE Professional Development Series)
Language: en
Pages: 700
Authors: Yusuf Bhaiji
Categories: Computers
Type: BOOK - Published: 2008-03-20 - Publisher: Pearson Education

GET EBOOK

CCIE Professional Development Network Security Technologies and Solutions A comprehensive, all-in-one reference for Cisco network security Yusuf Bhaiji, CCIE No
Network Security Principles and Practices
Language: en
Pages: 826
Authors: Saadat Malik
Categories: Computers
Type: BOOK - Published: 2003 - Publisher: Cisco Press

GET EBOOK

Expert solutions for securing network infrastructures and VPNs bull; Build security into the network by defining zones, implementing secure routing protocol des