Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | Korea Communication Market Data | List of Contributors | Become a Contributor |    
 
 
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung   Korean Vendors
 
Real World Private 5G Cases   4 Deployment Models On-Premise Cases 5G Core Control Plane Sharing Cases

5G Core Sharing Cases

   
 
Private 5G Deployment   • Private 5G Frequency Allocation Status in Korea  South Korean government's regulations on private 5G and KT's strategy for entering the market
Cases in Korea   Private 5G Operators |   SK Networks Service (SI) Sejong Telecom (Wire-line Carrier) KT MOS (Affiliate of KT) • Newgens (SI) • NAVER Cloud more >>  
    Enterprise DIY |   Korea Hydro & Nuclear Power (Power Plant) Korea Electric Power Corporation (Energy) • Republic of Korea Navy more >>
 
CHANNELS     HFR Private 5G Solution (my5G)       my5G Solution Components       my5G Key Features        my5G Resources        my5G News          
 
banner
banner
IEEE 802.1X-based user authentication in KT, SK Telecom and LG U+'s Wi-Fi networks
February 26, 2015 | By Chris Yoo (tech@netmanias.com)
Online viewer:
Comments (7)
9
rmhapankar 2015-02-27 14:45:24

Hi,

 

You mentioned about "MAC address based authentication for non-USIM devices", how that would work ?

How you address concerns like MAC cloning ?

 

Best Regards,

Rajesh

Netmanias 2015-03-02 15:06:12

Hi Rajesh,

 

'MAC address-based authentication' is performed during 802.11 association procedure. So, after Step 3 in Figure 1 above, the AP sends the MAC address of the station via Access Request message to AAA, where the MAC address is already provisioned. Then, AAA begins authentication based on the provisioned information, and then forwards the result to the AP via Access Accept/Access Reject message.

As you pointed out, it is impossible to prevent MAC cloning in this type of authentication, unfortunately. However, because AAA collects accounting information of stations that are accessing it (that is, as AAA knows whether a station at a specific MAC addresses has accessed it or not), it can at least prevent multiple stations from making a request for authentication using the same MAC address. 

 

Thanks,

Netmanias.com

Harishankar 2015-03-09 15:52:58

Hi,

 

Does the Korean operators uses HS2.0 based solution for  auto-login when in Wifi coverage without user intervention?

Do these operators consider the Wifi network as trusted or untrusted domain? IS there any dependency on the handset for such a solution?

What if the KT subscribers roams in US for  example. Will he be able to use the KT wifi roaming?

 

Regards,

Harishankar

 

David Kim 2015-03-09 18:54:49

KT provides hotspot 2.0 service with the following roaming partners:

NTT DoCoMo (Japan), CMCC (China), PCCW (China), Chunghwa Telecom (Taiwan)

- Authentication protocol: EAP-AKA

- Supported device: smartphone (Android, iOS), iPad with cellular interface


You can find article in link below:

http://www.kt.com/eng/pr/news_01.jsp (type the 'automatic roaming' in the serach box)

Harishankar 2015-03-10 16:09:22

Thanks for the reply. 

Does it work for non-SIM based devices like Tablets? How authentication works for that case?

 

 

David Kim 2015-03-12 09:29:56

According to Hotspot 2.0, devices without SIM/USIM card can be authenticated using EAP-TLS or EAP-TTLS. But, as far as I know KT does not support this EAP-TLS/EAP-TTLS authentication, but features roaming that uses captive portal-based ID/PW authentication, instead.
 
Simply put, current KT subscribers can access Wi-Fi:   

  1. in 4 different operators' networks in 3 countries by using a device with a SIM/USIM card through EAP-AKA authentication procedure, or
  2. in about 100 countries by using any device (with or without SIM/USIM card) through captive portal/WISPr.
Rajesh Desisetti 2019-09-30 18:28:55

Hi, 

Please share Dot1x and Mab authentication with AAA and dynamic ACL feature.

Thank you for visiting Netmanias! Please leave your comment if you have a question or suggestion.
 
 
 
 

[HFR Private 5G: my5G]

 

Details >>

 

 

 

     
         
     

 

     
     

Subscribe FREE >>

Currently, 55,000+ subscribed to Netmanias.

  • You can get Netmanias Newsletter

  • You can view all netmanias' contents

  • You can download all netmanias'

    contents in pdf file

     
     

 

     
         
     

 

 

 

View All (858)
4.5G (1) 5G (102) AI (8) AR (1) ARP (3) AT&T (1) Akamai (1) Authentication (5) BSS (1) Big Data (2) Billing (1) Blockchain (3) C-RAN/Fronthaul (18) CDN (4) CPRI (4) Carrier Ethernet (3) Charging (1) China (1) China Mobile (2) Cisco (1) Cloud (5) CoMP (6) Connected Car (4) DHCP (5) EDGE (1) Edge Computing (1) Ericsson (2) FTTH (6) GSLB (1) GiGAtopia (2) Gigabit Internet (19) Google (7) Google Global Cache (3) HLS (5) HSDPA (2) HTTP Adaptive Streaming (5) Handover (1) Huawei (1) IEEE 802.1 (1) IP Routing (7) IPTV (21) IoST (3) IoT (56) KT (43) Korea (20) Korea ICT Market (1) Korea ICT Service (13) Korea ICT Vendor (1) LG U+ (18) LSC (1) LTE (78) LTE-A (16) LTE-B (1) LTE-H (2) LTE-M (3) LTE-U (4) LoRa (7) MEC (4) MPLS (2) MPTCP (3) MWC 2015 (8) NB-IoT (6) Netflix (2) Network Protocol (21) Network Slice (1) Network Slicing (4) New Radio (9) Nokia (1) OSPF (2) OTT (3) PCRF (1) Platform (2) Private 5G (11) QoS (3) RCS (4) Railway (1) Roaming (1) SD-WAN (17) SDN/NFV (71) SIM (1) SK Broadband (2) SK Telecom (35) Samsung (5) Security (16) Self-Driving (1) Small Cell (2) Spectrum Sharing (2) Switching (6) TAU (2) UHD (5) VR (2) Video Streaming (12) VoLTE (8) VoWiFi (2) Wi-Fi (31) YouTube (6) blockchain (1) eICIC (1) eMBMS (1) iBeacon (1) security (1) telecoin (1) uCPE (2)
Password confirmation
Please enter your registered comment password.
Password