plement (protocols are already developed, a record is
trivial) but the first one needs a deeper analysis be-
cause it is responsible for an authentication method
and connected services choice. We can talk basically
about a parametric system which decides about pro-
tocol/protocols based on input information. We can
model it by a system shown in a Figure 2.
Figure 2: Process of choice.
Information from the client or the server database re-
ceived during the handshake phase works as an input.
The protocol is chosen based on this information and
on information from the protocol information table.
Information from the handshake can be considered as
parameters of the system. The protocol choice pro-
cess works as follows:
• A new protocol inclusion – It is necessary to cre-
ate a new record in the protocol information ta-
ble. The authority must provide information about
proof factor (what is used for authentication), se-
curity, mobile devices support etc. so the system
is later able to do correct decision. This protocol
assessment is needed only during the new proto-
col inclusion.
• Parameters discovery – this is a part of the hand-
shake phase. As all server data are accessible from
the database the server needs only data sent by the
client.
• Protocol choice – the system analyze the agree-
ment between client demands and server sup-
ported protocols. Firstly protocols that does not
comply critical demands are rejected. The most
suitable protocol is chosen in the second phase. If
there is a need for more services than one proto-
col can support then more protocols are selected.
There is no need for more handshakes among
these protocols runs.
• Execution – the client gets information about the
choice so the service can be provided
We chose only basic protocols for this system by now.
The important fact is that there is a possibility to use
any authentication method in future. It is also easy
to reduce the use of a weak protocol by changes in a
protocol information table so it wont be used except
inevitable situations.
4 CONCLUSIONS
This paper is dealing with the AAA area and is fo-
cused mainly on user authentication. We did a cur-
rent state analysis in the first part. Thanks to a deeper
examination we identified a need for a better sup-
port of new authentication techniques and easier in-
clusion of new systems. The Universal Authentica-
tion Framework was introduced as a reaction to these
findings. Our goal is to solve these problems and pro-
vide a solution based on better flexibility and modu-
larity. The dependency on a concrete mechanism is
removed. The choice of an actual protocol is made
during the handshake stage from extendable set of
supported protocols. By this design we get a system
where always a most suitable protocol is used for ev-
ery type of client and where new and better methods
can be easily introduced. This also solves the prob-
lem of today’s networks where varied equipment with
very different capabilities and needs meet.
ACKNOWLEDGEMENTS
Sponsored under the National Program of Research
II by the Ministry of Education, Youth and Sports of
the Czech Republic in 2C08002 Project - KAAPS Re-
search of Universal and Complex Authentication and
Authorization for Permanent and Mobile Computer
Networks.
REFERENCES
Calhoun, P. (2003). Diameter base protocol.
Cao, X. and Li, H. (2006). Secure mobile ip registration
scheme with aaa from parings to reduce registration
delay. pages 1037–1042.
Hill, J. (2001). An analysis of the radius authentication pro-
tocol.
Jiann-Gwo, D. and Cinhg-Song, W. (2007). Secured op-
eration planning on service networks. ICICIC ’07:
Second International Conference on Innovative Com-
puting, Informatio and Control, pages 1–4.
Lee, J.-H. (2007). Architecture for mobile ipv6. pages
1246–1251.
Network Sorcery, Inc. (1996). Diameter.
Rigney, C. (1997). Authentication dial in user service (ra-
dius).
Rigney, C. (2000). Radius accounting.
SECRYPT 2009 - International Conference on Security and Cryptography
60