Publication No 29554

Author(s)

Sailer, R.*

Title

Integrating Authentication into Existing Protocols

Topics

Signalling; Network Security

Methods

Protocol Engineering

Keywords

SIGNALLING; ISDN; NETWORK SECURITY; AUTHENTICATION

Abstract

Proving the identity of individuals is the basis for many communication services and belongs to the context of network security . Access control regulates the rights of individuals to access services or ata. It is necessary to be sure of the idnetity of the asking individual to implement effective identity based access control mechanism. Furhtermore, it is necessary to provide the facility to prove the identity of individuals accessing data or services in order to prosecute them if they misuse their rights and compromise systems. Proving one's identity is referred to as authentication. Due to the overwhelming importance of authentication there are several well known and investigated protocols to verify a claimed identity. This paper shows a way to integrate authentication protocols into existing user- network signalling protocols. It depicts how to integrate authentication into the ISDN user signalling. Authentication is implemented in a way that affects the complex signalling software as little as possible. The implementation introduces minimal additional delays.

Year

1996

Reference entry

Sailer, R.
Integrating Authentication into Existing Protocols
Proceedings of the 5th Open Workshop on High Speed Networks, Paris, March 1996, pp. 4.25-4.31

BibTex file

Download  [BIBTEX]

Full Text

Download  [PS]

Authors marked with an asterisk (*) were IKR staff members at the time the publication has been written.