02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PROXY BASED AUTHENTICATION LOCALISATION SCHEME FOR HANDOVER<br />

networks, and can provide the neighbour network identifier list to the HAAA along with<br />

the MH’s request for the FAT.<br />

Follow<strong>in</strong>g the successful attachment to the serv<strong>in</strong>g network sAN, the MH sends a FAT<br />

Request with an encrypted mobile nonce ( K ( N m ) ) to its HAAA to request the FATs<br />

E hm<br />

via the sAN. The sAN provides an identifier list of its Neighbour Access Networks<br />

(NAN) NAN ID �AN , AN ,..., AN �<br />

_ s 1 2 t that <strong>in</strong>cludes the identifier of every nearby AN<br />

( AN t ). The sAN forwards the FAT request along with the identifier list NAN _ IDs<br />

to<br />

the MH’s HAAA.<br />

Upon receiv<strong>in</strong>g the FAT request, the HAAA generates a server nonce ( N s ), which will<br />

be encrypted <strong>in</strong> the generated FAT along with other security credentials as shown <strong>in</strong><br />

Equation 6.1. The server nonce N s will later be provided to the FAP, and used as a<br />

challenge to verify the MH’s identity. S<strong>in</strong>ce N s is generated for a specific AN, the<br />

HAAA needs to f<strong>in</strong>d the associated FAP accord<strong>in</strong>g to the AN’s identifier. The HAAA<br />

issues a FAT for every AN <strong>in</strong>cluded <strong>in</strong> the neighbour access network identifier list<br />

NAN _ IDs<br />

:<br />

FAT m s p<br />

� E ( ID , N , PID , SQN,<br />

LAK,<br />

MAC)<br />

(Equation 6.1)<br />

K hp<br />

Each FAT encloses the <strong>in</strong>formation about the MH’s identity ( ID m ), the server nonce<br />

( s N ) issued by the HAAA, the Pseudonym Identity (PID) of the FAP ( PID p ), the<br />

sequence number (SQN), the Local Authentication Key (LAK) for the FAP and the<br />

Message Authentication Code (MAC) to be used for verify<strong>in</strong>g the MH’s identify.<br />

For security concerns, the server nonce N s issued will be varied for different FAPs so<br />

that different access networks would have different security contexts. The FAP’s PID p<br />

is derived us<strong>in</strong>g the secret splitt<strong>in</strong>g method described <strong>in</strong> [101]:<br />

PID � h(<br />

K || N ) � ID � N<br />

(Equation 6.2)<br />

p<br />

hp<br />

s<br />

p<br />

s<br />

- 120 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!