02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PROXY BASED AUTHENTICATION LOCALISATION SCHEME FOR HANDOVER<br />

K hm are used to build the two types of explicit trust associations required <strong>in</strong> the<br />

handover attachment. Although their updates can be agreed upon by the <strong>in</strong>volved parties,<br />

these keys are mostly regarded as “permanent” <strong>in</strong> contrast to the two derived temporary<br />

keys: Local Authentication Key (LAK) and Pairwise Master Key (PMK). The LAK is a<br />

session-related key generated by the HAAA. It is employed by the FAP to perform<br />

mutual authentication with the MH and establish the necessary security context<br />

associated with the AN. The LAK is used to derive the PMK, which is specified <strong>in</strong><br />

IEEE 802.11i [42] for <strong>wireless</strong> l<strong>in</strong>k protection.<br />

Table 6.1 A list of the PBAL trust association model related keys<br />

Abbr. Description Temporary<br />

key<br />

K hp Pairwise key shared between HAAA and FAP N<br />

K pa<br />

Pairwise key shared between FAP and AN N<br />

K hm Pre-Shared Key (PSK) between HAAA and MH N<br />

LAK Local authentication key shared among HAAA, FAP and<br />

MH<br />

Y<br />

PMK Pairwise master key shared among FAP, AN and MH Y<br />

6.3.2 Fast Authentication Ticket Generation Method<br />

After complet<strong>in</strong>g the attachment to a network, the MH can request a Fast Authentication<br />

Ticket (FAT) for every nearby access network from its HAAA. The nearby access<br />

networks can be either pre-determ<strong>in</strong>ed us<strong>in</strong>g the pre-stored network location<br />

<strong>in</strong>formation, or determ<strong>in</strong>ed us<strong>in</strong>g the network trust <strong>in</strong>formation retrieval scheme<br />

presented <strong>in</strong> Chapter 4. The location based approach requires that a network has<br />

accurate location <strong>in</strong>formation of its neighbour<strong>in</strong>g networks. S<strong>in</strong>ce all the location data<br />

have to be pre-loaded, this approach is static and can not cope with changes to networks.<br />

With the method proposed <strong>in</strong> Chapter 4, the serv<strong>in</strong>g Access Network (sAN) that has<br />

obta<strong>in</strong>ed its neighbour network trust pattern can provide the MH’s HAAA with an<br />

identifier list of its neighbour<strong>in</strong>g access networks.<br />

Note that the determ<strong>in</strong>ation of the access networks <strong>in</strong> vic<strong>in</strong>ity is outside the scope of this<br />

discussion. It is assumed here that the sAN has the knowledge of its surround<strong>in</strong>g access<br />

- 119 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!