Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IF-RFC5247 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2016-12-27 ÃÑÆäÀÌÁö 86
ÇѱÛÇ¥Áظí EAP ÇÁ·ÎÅäÄÝ Å° °ü¸® ÇÁ·¹ÀÓ¿öÅ©
¿µ¹®Ç¥Áظí Extensible Authentication Protocol(EAP) Key Management Framework
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â EAP Å° °èÃþ ±¸Á¶, °¢ EAP ¹æ½Ä¿¡ ÀÇÇØ ¸¸µé¾îÁö´Â Å° »ý¼º ÀÚ·á¿¡ ´ëÇØ ÇÏÀ§ °èÃþ¿¡¼­ ¼öÇàÇÒ ÀÛ¾÷, ÇǾî¿Í ÀÎÁõÀÚ°£ÀÇ º¸¾È¿¬°ü ÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ ±â´É ¿ä±¸»çÇ×, ÇÚµå¿ÀÇÁ Áö¿¬½Ã°£À» À§ÇÑ ±â¹ýµé, ±×¸®°í ½Ã½ºÅÛ ¼öÁØÀÇ º¸¾È À§Çù ¹× º¸¾È °í·Á»çÇ×À» Á¤ÀÇÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard specifies the EAP key hierarchy, lower-layer operation for EAP keying material and parameters exported by the EAP method, functional requirements for security association protocol, mechanisms proposed for reducing handoff latency, system level threats and security considerations.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IF-RFC5247.pdf TTAE.IF-RFC5247.pdf            

ÀÌÀü
ÆÐŶ ³×Æ®¿öÅ© µ¿±âÈ­¿¡ ´ëÇÑ Á¤ÀÇ ¹× ¿ë¾î
´ÙÀ½
40 ±â°¡±Þ ¼öµ¿Çü ±¤ Åë½Å¸Á (NG-PON2): ¹°¸®°èÃþ ±Ô°Ý