02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PROXY BASED AUTHENTICATION LOCALISATION SCHEME FOR HANDOVER<br />

and generate session keys [74]. The delay <strong>in</strong>troduced by the authentication procedure<br />

adds to the handover latency and consequently affects the ongo<strong>in</strong>g communications.<br />

Multimedia communications such as VoIP is very sensitive to handover delay. For this<br />

reason, the AAA related round trips between a mobile user and its home network <strong>in</strong> a<br />

handover should be reduced as many as possible. The EAP pre-authentication method<br />

specified by IETF <strong>in</strong> [94] has been proposed for such a purpose. In the EAP preauthentication,<br />

the authentication for a target authenticator is performed while a<br />

mobile’s session is still <strong>in</strong> progress via the serv<strong>in</strong>g network. The goal of the preauthentication<br />

is to avoid AAA signall<strong>in</strong>g for EAP when or soon after the mobile moves<br />

[94]. Accord<strong>in</strong>gly, two approaches are possible: 1) pre-authenticate a mobile user<br />

directly to a target network; 2) pre-authenticate the mobile user <strong>in</strong>directly via its serv<strong>in</strong>g<br />

network. The direct pre-authentication approach heavily relies on the simultaneous use<br />

of multiple <strong>in</strong>terfaces on a mobile device [95], and as the support from the mobile’s<br />

AAA server so as to allow registration of multiple IP addresses. This solution <strong>in</strong>creases<br />

the mobile’s power consumption and the complexity of deployment. The second<br />

approach makes use of the secure channel between the serv<strong>in</strong>g network and the<br />

candidate networks to transfer pre-authentication messages. The Inter-Access Po<strong>in</strong>t<br />

Protocol (IAPP), also known as IEEE 802.11F [96] has been specified to allow the<br />

transfer of security context <strong>in</strong>formation between two 802.11 APs with<strong>in</strong> the same<br />

Distribution System (DS). The IAPP is commonly referred to as a layer 2 (L2) context<br />

transfer protocol. The Context Transfer Protocol (CTP) specified <strong>in</strong> RFC 4067 [97]<br />

supports context transfers over various L2 access technologies at layer 3 (L3). However,<br />

these L2 and L3 solutions rely on a trust relationship be<strong>in</strong>g established between the old<br />

AN (oAN) and the new AN (nAN) as shown <strong>in</strong> Figure 6.1 before a context transfer can<br />

be made. This greatly limits their applicability <strong>in</strong> a multi-operator environment, where<br />

the adjacent networks may belong to different network operators.<br />

This chapter ma<strong>in</strong>ly addresses security for handover between non trust-associated<br />

doma<strong>in</strong>s. Here, doma<strong>in</strong> is referred as an adm<strong>in</strong>istrative doma<strong>in</strong> which has a s<strong>in</strong>gle<br />

Access, Authorisation, and Account<strong>in</strong>g (AAA) entity for authenticat<strong>in</strong>g and authoris<strong>in</strong>g<br />

its mobile subscribers for access<strong>in</strong>g network resources. A proxy-based authentication<br />

localisation scheme is proposed. It <strong>in</strong>cludes two specified phases: fast authentication<br />

- 113 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!