Proving the identity of individuals is the basis for many communication services and belongs to the context of network security . Access control regulates the rights of individuals to access services or ata. It is necessary to be sure of the idnetity of the asking individual to implement effective identity based access control mechanism. Furhtermore, it is necessary to provide the facility to prove the identity of individuals accessing data or services in order to prosecute them if they misuse their rights and compromise systems. Proving one's identity is referred to as authentication. Due to the overwhelming importance of authentication there are several well known and investigated protocols to verify a claimed identity. This paper shows a way to integrate authentication protocols into existing user- network signalling protocols. It depicts how to integrate authentication into the ISDN user signalling. Authentication is implemented in a way that affects the complex signalling software as little as possible. The implementation introduces minimal additional delays.
Year
1996
Reference entry
Sailer, R. Integrating Authentication into Existing Protocols
Proceedings of the 5th Open Workshop on High Speed Networks, Paris, March 1996, pp. 4.25-4.31