Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
8
result(s) for
"and authorization (AAA)"
Sort by:
Smart and Adaptive Architecture for a Dedicated Internet of Things Network Comprised of Diverse Entities: A Proposal and Evaluation
by
Lundberg, Lars
,
Singh, Shailesh Pratap
,
Ali, Nauman Bin
in
5G mobile communication systems
,
accounting
,
and authorization
2022
Advances in 5G and the Internet of Things (IoT) have to cater to the diverse and varying needs of different stakeholders, devices, sensors, applications, networks, and access technologies that come together for a dedicated IoT network for a synergistic purpose. Therefore, there is a need for a solution that can assimilate the various requirements and policies to dynamically and intelligently orchestrate them in the dedicated IoT network. Thus we identify and describe a representative industry-relevant use case for such a smart and adaptive environment through interviews with experts from a leading telecommunication vendor. We further propose and evaluate candidate architectures to achieve dynamic and intelligent orchestration in such a smart environment using a systematic approach for architecture design and by engaging six senior domain and IoT experts. The candidate architecture with an adaptive and intelligent element (“Smart AAA agent”) was found superior for modifiability, scalability, and performance in the assessments. This architecture also explores the enhanced role of authentication, authorization, and accounting (AAA) and makes the base for complete orchestration. The results indicate that the proposed architecture can meet the requirements for a dedicated IoT network, which may be used in further research or as a reference for industry solutions.
Journal Article
Outsourcing Authentication, Authorization and Accounting, and Charging and Billing Services to Trusted Third Parties for Future Consumer-Oriented Wireless Communications
2023
In this article, proposals for the realization of an infrastructural re-think on the way authentication, authorization and accounting (AAA) services and charging and billing (C&B) services are supplied within the ubiquitous consumer wireless world (UCWW) are set out. Proposals envisage these services being owned and organized by trusted third parties (TTPs) and utilizing new globally standardized protocols and infrastructural entity interfaces. Their implementation will affect a successful realization of the UCWW’s consumer-based techno-business infrastructure, complementing or even replacing the present legacy network-centric, subscriber-based one. The approach enables a loose dynamic, or even casual, consumer-type association between consumers (mobile users) and network/teleservice providers, and it opens the door to multifaceted benefits for consumers, for new network/teleservice providers, and for other new UCWW business entities in addition to the 3P-AAA and 3P-C&B service providers at the heart of this article’s proposals.
Journal Article
Understanding 802.1x and AAA
by
McMillan, Troy
in
authentication server
,
Authentication, Authorization, and Accounting (AAA)
,
network access
2018
This chapter offers guidance on how to understand Authentication, Authorization, and Accounting (AAA) 802.1x components, use RADIUS and TACACS+ technologies, configure administrative access with TACACS+, verify router connectivity to TACACS+, and integrate Active Directory with AAA. The role of the authenticator can be performed by a wide variety of network access devices, including remote access servers (both dial‐up and VPN), switches, and wireless access points. The authenticator requests credentials from the supplicant and, upon receipt of those credentials, relays them to the authentication server, where they are validated. Upon successful verification, the authenticator is notified to open the port for the supplicant to allow network access. Local AAA authentication and accounting is a form of AAA in which the user accounts are located on the device rather than on an AAA server. To use AAA services for any type of authentication, it must be enabled on the device.
Book Chapter
Network Security
by
Davies, Guy
in
Advanced Encryption Standard (AES)
,
authentication, authorization and accounting (AAA)
,
Denial‐of‐service attacks (DoS)
2004
This chapter contains sections titled:
Securing Access to Your Network Devices
Securing Access to the Network Infrastructure
Protecting Your Own and Others' Network Devices
Book Chapter
Security
by
Chen, Jyh‐Cheng
,
Zhang, Tao
in
authentication and key agreement
,
authentication, authorization, and accounting
,
IP security
2004
This chapter discusses how network security is supported over the Internet, 3GPP networks, and 3GPP2 networks. It first discusses the different aspects of security management, various forms of security attacks, and some of the key fundamental technologies used in most network security mechanisms. Then, it describes the specific security support mechanisms designed for the Internet, in a 3GPP network, and in a 3GPP2 network.
Book Chapter