02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PROXY BASED AUTHENTICATION LOCALISATION SCHEME FOR HANDOVER<br />

E LAK ( N m || N s || N p ) <strong>in</strong> a Fast Authentication Response to the MH. The MH can<br />

compute the LAK us<strong>in</strong>g Equation 6.3 based on its knowledge of the required credentials.<br />

After receiv<strong>in</strong>g the fast authentication response from the FAP, the MH is able to decrypt<br />

E LAK ( N m || N s || N p ) with the LAK computed by itself. The N m obta<strong>in</strong>ed should be the<br />

same as the orig<strong>in</strong>al one issued previously for request<strong>in</strong>g the FAT. By do<strong>in</strong>g so, the MH<br />

verifies the authenticity of the visited network nAN.<br />

After verify<strong>in</strong>g the nAN’s identity, the MH gets itself authenticated to the nAN. The<br />

MH uses the challenge s N provided by its HAAA, K hm , ID m , ID s , and N m to compute<br />

a MAC value us<strong>in</strong>g Equation 6.4. The MAC along with N p are encrypted <strong>in</strong><br />

E LAK ( MAC || N p ) and delivered to the FAP as a challenge response. With decryption, the<br />

FAP verifies the MH’s identity by compar<strong>in</strong>g the received MAC with the XMAC<br />

provided by the HAAA. If they are equal, the follow<strong>in</strong>g PMK is generated, and sent to<br />

the nAN to build the necessary security context.<br />

PMK � prf ( LAK , N m || N s || N p )<br />

(Equation 6.6)<br />

A fast authentication response is returned to the MH to notify the authentication result.<br />

Then, the MH can build the correspond<strong>in</strong>g PMK for communications with the nAN.<br />

6.3.4 Session Key Renewal<br />

In the PBAL, a session key renewal method is proposed so that a mobile user may<br />

renew its session key (PMK) that is used to protect the <strong>wireless</strong> l<strong>in</strong>k accord<strong>in</strong>g to IEEE<br />

802.11i [42]. Change of session key would reduce the risk that the mobile user uses a<br />

compromised session key to communicate with an access network.<br />

In the PBAL session key renewal method, the session key renewal can be <strong>in</strong>itiated by<br />

either the sAN or the MH. Figure 6.6 shows how the session key PMK be<strong>in</strong>g shared<br />

between the MH and the sAN can be renewed as requested by the MH. The MH<br />

generates a new mobile nonce N m ',<br />

and sends a Key Renew Request <strong>in</strong>clud<strong>in</strong>g this new<br />

nonce N m ' along with the orig<strong>in</strong>al server nonce N s (previously issued by the HAAA)<br />

to the FAP to <strong>in</strong>itiate the session key renewal process. N m ' and N s are encrypted with<br />

- 125 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!