Infrastructure Security pp 115-128
Authentication and Authorization of Mobile Clients in Public Data Networks
- First Online:
- Cite this paper as:
- Reddy P., Krishnan V., Zhang K., Das D. (2002) Authentication and Authorization of Mobile Clients in Public Data Networks. In: Davida G., Frankel Y., Rees O. (eds) Infrastructure Security. Lecture Notes in Computer Science, vol 2437. Springer, Berlin, Heidelberg
We present a protocol that enables mobile clients to be authenticated and authorized in data networks that are deployed in public places otherwise referred to as hotspots! The three key elements of a hotspot network are the mobile client, the hotspot server and the service provider. A mobile client is any device that can be used to access the internet. The hotspot server is a node in the data network that is a bridge between wireless clients and wired broadband network. The service provider is an entity that has an existing service relationship with the client and the hotspot server. The protocol discussed in this paper shows how three parties: Client, hotspot server and the service provider come together in a mutually un-trusted environment, authenticate each other and upon authentication exchange authorization tokens that are used in subsequent service requests. The most common use of this protocol is for clients to gain internet connectivity in public places, specifically in hotspots. The hotspot server provides the equivalent of cellular network roaming functionality. The service provider allows added features to its clients.
Unable to display preview. Download preview PDF.