Optimized Derivation of AAA-based Handover Keys
draft-vidya-mipshop-hk-opt-aaa-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Vidya Narayanan | ||
Last updated | 2006-02-27 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
AAA-HK [1] provides a method for a MN and an AR to establish a shared key using a AAA server. To ensure that the round trip to the AAA server does not delay handoff, the handover key must be derived independent of and well ahead of the actual handoff, preferably immediately after moving to a new access router. This document describes one such method of optimizing the handover key derivation by using an AR as an authenticating server, once the MN and AR have established a security association.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)