Making The Case For Eap Channel Bindings

SARNOFF'09: Proceedings of the 32nd international conference on Sarnoff symposium(2009)

引用 2|浏览6
暂无评分
摘要
In current networks that use EAP and AAA for authenticated admission control, such as WiFi, WiMAX, and various 3G internetworking protocols, a malicious base station can advertise false information to prospective users in an effort to manipulate network access in some way. This paper identifies and discusses the resulting threats (e.g. the lying NAS problem in enterprise networks and the newly identified lying provider problem in roaming environments) and shows how these threats can be exploited for a number of attacks, including traffic herding, denial of service, cryptographic downgrade attacks, and forced roaming. Finally, the paper presents how an EAP channel binding protocol can thwart the identified attacks by allowing a client to inform the EAP server about the unauthenticated information it received during the network selection process. The back-end server can then ensure the consistency of the advertised information with its configured policy. As a result, EAP channel bindings enable an end-to-end validation of network properties, which is otherwise infeasible in existing AAA infrastructures. Standardization activities currently exist within the IETF to implement this technique.
更多
查看译文
关键词
message authentication,protocols,telecommunication congestion control,3G internetworking protocols,WiFi,WiMAX,authenticated admission control,back-end server,base station,cryptographic downgrade attacks,denial of service attack,extensible authentication protocol,network access,
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要