{"title":"无线ATM网络的认证协议","authors":"D. Patiyoot, S. Shepherd","doi":"10.1109/ICATM.1998.688163","DOIUrl":null,"url":null,"abstract":"With the growing acceptance of ATM as the standard for broadband networking and the increasing importance of wireless devices, it has become appropriate to extend ATM application to wireless platforms. Adding a wireless network to existing wired networks creates a new set of problems. Security functions have to be reconsidered since wired network security does not account for the open medium, mobile roaming. A necessary foundation for securing a network is the ability to authenticate entities. There is a need to authenticate users of the system so that the resources will not be misused by nonsubscribers. After authentication by a suitable protocol, two parties involved in communications should be entitled to believe that they are communicating with each other and not with intruders. Good authentication is that which allows entities to provide evidence that they know a particular secret without revealing the secret. It should not provide any information to impersonators or eavesdroppers while being authenticated. In mobile networks, normally secret-key cryptography is used for authentication. In this paper, both secret-key and public-key cryptography are used in wireless ATM networks.","PeriodicalId":257298,"journal":{"name":"1998 1st IEEE International Conference on ATM. ICATM'98","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Authentication protocols for wireless ATM networks\",\"authors\":\"D. Patiyoot, S. Shepherd\",\"doi\":\"10.1109/ICATM.1998.688163\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the growing acceptance of ATM as the standard for broadband networking and the increasing importance of wireless devices, it has become appropriate to extend ATM application to wireless platforms. Adding a wireless network to existing wired networks creates a new set of problems. Security functions have to be reconsidered since wired network security does not account for the open medium, mobile roaming. A necessary foundation for securing a network is the ability to authenticate entities. There is a need to authenticate users of the system so that the resources will not be misused by nonsubscribers. After authentication by a suitable protocol, two parties involved in communications should be entitled to believe that they are communicating with each other and not with intruders. Good authentication is that which allows entities to provide evidence that they know a particular secret without revealing the secret. It should not provide any information to impersonators or eavesdroppers while being authenticated. In mobile networks, normally secret-key cryptography is used for authentication. In this paper, both secret-key and public-key cryptography are used in wireless ATM networks.\",\"PeriodicalId\":257298,\"journal\":{\"name\":\"1998 1st IEEE International Conference on ATM. ICATM'98\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-06-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1998 1st IEEE International Conference on ATM. ICATM'98\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICATM.1998.688163\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1998 1st IEEE International Conference on ATM. ICATM'98","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICATM.1998.688163","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authentication protocols for wireless ATM networks
With the growing acceptance of ATM as the standard for broadband networking and the increasing importance of wireless devices, it has become appropriate to extend ATM application to wireless platforms. Adding a wireless network to existing wired networks creates a new set of problems. Security functions have to be reconsidered since wired network security does not account for the open medium, mobile roaming. A necessary foundation for securing a network is the ability to authenticate entities. There is a need to authenticate users of the system so that the resources will not be misused by nonsubscribers. After authentication by a suitable protocol, two parties involved in communications should be entitled to believe that they are communicating with each other and not with intruders. Good authentication is that which allows entities to provide evidence that they know a particular secret without revealing the secret. It should not provide any information to impersonators or eavesdroppers while being authenticated. In mobile networks, normally secret-key cryptography is used for authentication. In this paper, both secret-key and public-key cryptography are used in wireless ATM networks.