AAA based Keying for Wireless Handovers: Problem Statement
draft-nakhjiri-aaa-hokey-ps-03
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Madjid Nakhjiri | ||
Last updated | 2006-06-26 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
The Extensible Authentication Protocol (EAP) provides a framework for performing authentication and key management using the AAA infrastructure. The framework deals with a model which includes a peer, a pass-through authenticator and a backend authentication server. Some of the emerging mobile networks use EAP in handover scenarios in ways that go beyond currently defined EAP keying framework. This document provides a problem statement for the usage of EAP in these emerging mobile networks.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)