02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PROXY BASED AUTHENTICATION LOCALISATION SCHEME FOR HANDOVER<br />

Figure 6.1 A trust model for security analysis of handover<br />

The security of 3G UMTS has been developed to keep maximum compatibility with the<br />

current GSM security architecture. Mutual authentication is achieved by show<strong>in</strong>g<br />

knowledge of a security key K shared between a mobile user and the Authentication<br />

Centre (AuC) <strong>in</strong> its home network. Us<strong>in</strong>g the Authentication and Key Agreement (AKA)<br />

protocol [93], the AuC generates and transfers a set of security credentials, known as<br />

Authentication Vector (AV) of a mobile user to a visited network. With the AV, the<br />

visited network performs mutual authentication with the mobile user as described <strong>in</strong> Sec.<br />

3.2.2.<br />

In IEEE 802.11, a new standard IEEE 802.11i [42] has been developed to strength its<br />

security. IEEE 802.11i enhances key management and encryption algorithms by<br />

<strong>in</strong>corporat<strong>in</strong>g IEEE 802.1X [47], a port-based network control mechanism. IEEE<br />

802.1X employs the challenge-response Extensible Authentication Protocol (EAP) [18]<br />

to provide a variety of authentication <strong>mechanisms</strong>. The security <strong>mechanisms</strong><br />

implemented with<strong>in</strong> different <strong>wireless</strong> networks are limited to their particular<br />

architectures.<br />

To <strong>in</strong>tegrate WLAN with 3GPP network, 3rd Generation Partnership Project (3GPP)<br />

has def<strong>in</strong>ed two new <strong>mechanisms</strong> <strong>in</strong> TS 33.234 [75]: Extensible Authentication Protocol<br />

Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) and<br />

Extensible Authentication Protocol Method for GSM Subscriber Identity (EAP-SIM).<br />

The full authentication methods def<strong>in</strong>ed <strong>in</strong> these protocols need at lease three round<br />

trips with home AAA server and AuC. Thus, a lightweight process, the EAP-AKA fast<br />

re-authentication method has been proposed. It re-uses keys generated from the previous<br />

authentication process to save process<strong>in</strong>g time. However, with the fast re-authentication,<br />

at lease, two round trips are still needed to authenticate and authorise the mobile user<br />

- 112 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!