SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Smart Card Based Protocol for Secure and Controlled Access Of Mobile Host in IPv6 Compatible Foreign Network 954203020 郭啟揚 954203039 鄭志瑋 954203057 蔡繼正
Outline(1/1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card(1/4) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card(2/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card(3/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Smart Card(4/4)
Java  Card(1/2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Java Card(2/2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AAA architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RADIUS(1/2)
RADIUS(2/2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Diameter(1/4)
Diameter(2/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Diameter(3/4) ,[object Object],[object Object],[object Object],[object Object]
Diameter(4/4) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network layer security using  IPv6 ,[object Object],[object Object]
IP Source Address Filtering  User identity IP Share key  Share key
IPsec(2/5) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPsec(3/5)
IPsec(4/5)
IPsec(5/5) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User registration protocol(1/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User Registration Protocol(2/4) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MH  AR  AAAh
User registration protocol(3/4) LSA IPsec TSK TSK TSK
Local challenge VN_ID Care of address AUTH=HMAC-MD5(LC,user_id,VN_ID,SAmh) User Name AVP:user_id Extract LC , user_id , AUTH,VN_ID, MH_Ipaddr EAP AVP:AUTH Care of IP:MH_Ipaddr AAA Registration Request Challenge AVP:LC AUTH==HMAC-MD5(LC,user_id,VN_ID,SAmh ) HC,AUTHNET,Randtsk AUTHNET=HMAC-MD5(HC,user_id,VN_ID,SAmh) TSK=3DES(Randtsk,SAmh) ARA (Randtsk,HC,TSK,VN_ID,user_id,Authnet) EAP format AUTH=HMAC-MD5(HC,user_id,VN_ID,SAmh) AUTH==AUTHNET EAP format
Implementation detail Extensible Authentication Protocol AAA Registration Request
Comment(1/2) 3 6+3=9 訊息數 其他 技術 本名 縮寫 Mobile Authentication  Protocol Internet key Exchange IPsec +IPv6+ Smart card PKI+IKE Temporary share key Two phase MAP IKE
Comment(2/2) 低 高 成本 不易 容易 key 竊取 易 難 建置 key 定時更新 Key 不能失去 Key 安全性 本名 縮寫 Mobile Authentication  Protocol Public key infrastructure 高 低 MAP PKI
所以 MAP 將會是未來的趨勢 你認為呢? Thank you for attention Q&A

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (20)

Virtual Card Payments for Corporate Travel
Virtual Card Payments for Corporate TravelVirtual Card Payments for Corporate Travel
Virtual Card Payments for Corporate Travel
 
Mobile charging
Mobile chargingMobile charging
Mobile charging
 
Smart cart
Smart cartSmart cart
Smart cart
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
smart card
smart cardsmart card
smart card
 
Electronic paper
Electronic paperElectronic paper
Electronic paper
 
Smart Card
Smart CardSmart Card
Smart Card
 
Smart card system for buses
Smart card system for buses  Smart card system for buses
Smart card system for buses
 
E paper
E paper E paper
E paper
 
E Paper
E PaperE Paper
E Paper
 
Smart Card Presentation
Smart Card PresentationSmart Card Presentation
Smart Card Presentation
 
E-Paper Display
E-Paper DisplayE-Paper Display
E-Paper Display
 
E paper technology ppt
E paper technology pptE paper technology ppt
E paper technology ppt
 
E paper slides
E paper slidesE paper slides
E paper slides
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
E paper
E paperE paper
E paper
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 

Ähnlich wie Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In Foreign Network

Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase
 
17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)Jeff Green
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriElmarkPlusTurkiye
 
huawei-ls-s5328c-ei-brochure-datasheet.pdf
huawei-ls-s5328c-ei-brochure-datasheet.pdfhuawei-ls-s5328c-ei-brochure-datasheet.pdf
huawei-ls-s5328c-ei-brochure-datasheet.pdfHi-Network.com
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Featureslukky753
 
Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase
 
huawei-s3700-28tp-pwr-ei-brochure-datasheet.pdf
huawei-s3700-28tp-pwr-ei-brochure-datasheet.pdfhuawei-s3700-28tp-pwr-ei-brochure-datasheet.pdf
huawei-s3700-28tp-pwr-ei-brochure-datasheet.pdfHi-Network.com
 
huawei-s5700-28c-ei-24s-brochure-datasheet.pdf
huawei-s5700-28c-ei-24s-brochure-datasheet.pdfhuawei-s5700-28c-ei-24s-brochure-datasheet.pdf
huawei-s5700-28c-ei-24s-brochure-datasheet.pdfHi-Network.com
 
huawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdf
huawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdfhuawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdf
huawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdfHi-Network.com
 
huawei-ls-s5328c-si-brochure-datasheet.pdf
huawei-ls-s5328c-si-brochure-datasheet.pdfhuawei-ls-s5328c-si-brochure-datasheet.pdf
huawei-ls-s5328c-si-brochure-datasheet.pdfHi-Network.com
 
Security's Once and Future King
Security's Once and Future KingSecurity's Once and Future King
Security's Once and Future KingKapil Sachdeva
 
Security applications with Java Card
Security applications with Java CardSecurity applications with Java Card
Security applications with Java CardJulien SIMON
 
huawei-s3700-28tp-ei-dc-brochure-datasheet.pdf
huawei-s3700-28tp-ei-dc-brochure-datasheet.pdfhuawei-s3700-28tp-ei-dc-brochure-datasheet.pdf
huawei-s3700-28tp-ei-dc-brochure-datasheet.pdfHi-Network.com
 
How to Gain Visibility into Encrypted Threats
How to Gain Visibility into Encrypted ThreatsHow to Gain Visibility into Encrypted Threats
How to Gain Visibility into Encrypted ThreatsShain Singh
 
huawei-s5700-28c-pwr-ei-brochure-datasheet.pdf
huawei-s5700-28c-pwr-ei-brochure-datasheet.pdfhuawei-s5700-28c-pwr-ei-brochure-datasheet.pdf
huawei-s5700-28c-pwr-ei-brochure-datasheet.pdfHi-Network.com
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 
huawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdf
huawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdfhuawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdf
huawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdfHi-Network.com
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)NYversity
 
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...Tom Diederich
 

Ähnlich wie Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In Foreign Network (20)

Bloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server SpecificationsBloombase Spitfire StoreSafe Security Server Specifications
Bloombase Spitfire StoreSafe Security Server Specifications
 
17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)17.) layer 3 (advanced tcp ip routing)
17.) layer 3 (advanced tcp ip routing)
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
 
huawei-ls-s5328c-ei-brochure-datasheet.pdf
huawei-ls-s5328c-ei-brochure-datasheet.pdfhuawei-ls-s5328c-ei-brochure-datasheet.pdf
huawei-ls-s5328c-ei-brochure-datasheet.pdf
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
 
Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
 
huawei-s3700-28tp-pwr-ei-brochure-datasheet.pdf
huawei-s3700-28tp-pwr-ei-brochure-datasheet.pdfhuawei-s3700-28tp-pwr-ei-brochure-datasheet.pdf
huawei-s3700-28tp-pwr-ei-brochure-datasheet.pdf
 
huawei-s5700-28c-ei-24s-brochure-datasheet.pdf
huawei-s5700-28c-ei-24s-brochure-datasheet.pdfhuawei-s5700-28c-ei-24s-brochure-datasheet.pdf
huawei-s5700-28c-ei-24s-brochure-datasheet.pdf
 
huawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdf
huawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdfhuawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdf
huawei-s3700-52p-ei-48s-ac-brochure-datasheet.pdf
 
huawei-ls-s5328c-si-brochure-datasheet.pdf
huawei-ls-s5328c-si-brochure-datasheet.pdfhuawei-ls-s5328c-si-brochure-datasheet.pdf
huawei-ls-s5328c-si-brochure-datasheet.pdf
 
Security's Once and Future King
Security's Once and Future KingSecurity's Once and Future King
Security's Once and Future King
 
Security applications with Java Card
Security applications with Java CardSecurity applications with Java Card
Security applications with Java Card
 
huawei-s3700-28tp-ei-dc-brochure-datasheet.pdf
huawei-s3700-28tp-ei-dc-brochure-datasheet.pdfhuawei-s3700-28tp-ei-dc-brochure-datasheet.pdf
huawei-s3700-28tp-ei-dc-brochure-datasheet.pdf
 
How to Gain Visibility into Encrypted Threats
How to Gain Visibility into Encrypted ThreatsHow to Gain Visibility into Encrypted Threats
How to Gain Visibility into Encrypted Threats
 
huawei-s5700-28c-pwr-ei-brochure-datasheet.pdf
huawei-s5700-28c-pwr-ei-brochure-datasheet.pdfhuawei-s5700-28c-pwr-ei-brochure-datasheet.pdf
huawei-s5700-28c-pwr-ei-brochure-datasheet.pdf
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
huawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdf
huawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdfhuawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdf
huawei-s3700-28tp-ei-mc-ac-brochure-datasheet.pdf
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
In-Memory Key Value Store (KVS) in FPGA for Ultra Low Latency and High Throug...
 

Mehr von flyingsheep

Motivators Of Contribution To Wikipedia
Motivators Of Contribution To WikipediaMotivators Of Contribution To Wikipedia
Motivators Of Contribution To Wikipediaflyingsheep
 
Behavioral Intention Formation In Knowledge
Behavioral Intention Formation In Knowledge Behavioral Intention Formation In Knowledge
Behavioral Intention Formation In Knowledge flyingsheep
 
Creative Commons License In Taiwan
Creative Commons License In TaiwanCreative Commons License In Taiwan
Creative Commons License In Taiwanflyingsheep
 
Collaborative Thesaurus Tagging The Wikipedia Way
Collaborative Thesaurus Tagging The Wikipedia WayCollaborative Thesaurus Tagging The Wikipedia Way
Collaborative Thesaurus Tagging The Wikipedia Wayflyingsheep
 
wikinomics- peer pioneers
wikinomics- peer pioneerswikinomics- peer pioneers
wikinomics- peer pioneersflyingsheep
 
wikinomics-perfect storm
wikinomics-perfect stormwikinomics-perfect storm
wikinomics-perfect stormflyingsheep
 
Search Economic
Search Economic Search Economic
Search Economic flyingsheep
 

Mehr von flyingsheep (9)

Motivators Of Contribution To Wikipedia
Motivators Of Contribution To WikipediaMotivators Of Contribution To Wikipedia
Motivators Of Contribution To Wikipedia
 
Behavioral Intention Formation In Knowledge
Behavioral Intention Formation In Knowledge Behavioral Intention Formation In Knowledge
Behavioral Intention Formation In Knowledge
 
What is web2.0
What is web2.0What is web2.0
What is web2.0
 
Creative Commons License In Taiwan
Creative Commons License In TaiwanCreative Commons License In Taiwan
Creative Commons License In Taiwan
 
Collaborative Thesaurus Tagging The Wikipedia Way
Collaborative Thesaurus Tagging The Wikipedia WayCollaborative Thesaurus Tagging The Wikipedia Way
Collaborative Thesaurus Tagging The Wikipedia Way
 
wikinomics- peer pioneers
wikinomics- peer pioneerswikinomics- peer pioneers
wikinomics- peer pioneers
 
wikinomics-perfect storm
wikinomics-perfect stormwikinomics-perfect storm
wikinomics-perfect storm
 
Media wiki
Media wikiMedia wiki
Media wiki
 
Search Economic
Search Economic Search Economic
Search Economic
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Smart Card Based Protocol For Secure And Controlled Access Of Mobile Host In Foreign Network

  • 1. Smart Card Based Protocol for Secure and Controlled Access Of Mobile Host in IPv6 Compatible Foreign Network 954203020 郭啟揚 954203039 鄭志瑋 954203057 蔡繼正
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 12.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. IP Source Address Filtering User identity IP Share key Share key
  • 19.
  • 22.
  • 23.
  • 24.
  • 25. User registration protocol(3/4) LSA IPsec TSK TSK TSK
  • 26. Local challenge VN_ID Care of address AUTH=HMAC-MD5(LC,user_id,VN_ID,SAmh) User Name AVP:user_id Extract LC , user_id , AUTH,VN_ID, MH_Ipaddr EAP AVP:AUTH Care of IP:MH_Ipaddr AAA Registration Request Challenge AVP:LC AUTH==HMAC-MD5(LC,user_id,VN_ID,SAmh ) HC,AUTHNET,Randtsk AUTHNET=HMAC-MD5(HC,user_id,VN_ID,SAmh) TSK=3DES(Randtsk,SAmh) ARA (Randtsk,HC,TSK,VN_ID,user_id,Authnet) EAP format AUTH=HMAC-MD5(HC,user_id,VN_ID,SAmh) AUTH==AUTHNET EAP format
  • 27. Implementation detail Extensible Authentication Protocol AAA Registration Request
  • 28. Comment(1/2) 3 6+3=9 訊息數 其他 技術 本名 縮寫 Mobile Authentication Protocol Internet key Exchange IPsec +IPv6+ Smart card PKI+IKE Temporary share key Two phase MAP IKE
  • 29. Comment(2/2) 低 高 成本 不易 容易 key 竊取 易 難 建置 key 定時更新 Key 不能失去 Key 安全性 本名 縮寫 Mobile Authentication Protocol Public key infrastructure 高 低 MAP PKI
  • 30. 所以 MAP 將會是未來的趨勢 你認為呢? Thank you for attention Q&A