02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 6<br />

PROXY BASED AUTHENTICATION LOCALISATION<br />

6.1 Introduction<br />

SCHEME FOR HANDOVER<br />

In Next Generation Networks, a number of <strong>heterogeneous</strong> and distributed <strong>wireless</strong><br />

networks are expected to converge and have a common all-IP network architecture [6]<br />

These technologies could range from Wireless Local Area Network (WLAN) such as<br />

IEEE 802.11, to the third <strong>generation</strong> (3G) cellular networks such as Universal Mobile<br />

Telecommunications System (UMTS). These <strong>heterogeneous</strong> <strong>wireless</strong> networks are<br />

expected to co-exist as overlay networks and enable ubiquitous data services and<br />

provide very high data rates <strong>in</strong> strategic locations [4]. The <strong>in</strong>terwork<strong>in</strong>g of different<br />

<strong>wireless</strong> systems and the demand for ubiquitous services present enormous challenges<br />

to network security [13, 52].<br />

The trust model for <strong>wireless</strong> network is identified by three mutual trust relations<br />

between network entities [52]: two explicit trust relations between a Mobile Host (MH)<br />

and its home network, and between the home network and the Access Network (AN), <strong>in</strong><br />

addition to one implicit trust relation between the MH and the AN as shown <strong>in</strong> Figure<br />

6.1. The implicit trust relation between the MH and the AN is often dynamically<br />

established dur<strong>in</strong>g the handover attachment to the AN. The MH and the AN must verify<br />

each other dur<strong>in</strong>g the handover to make sure that both hold a trust relation to MH’s<br />

home network. Such identity verification <strong>in</strong> a handover, better known as mutual<br />

authentication, often needs the <strong>in</strong>volvement of the home network.<br />

- 111 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!