02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PROXY BASED AUTHENTICATION LOCALISATION SCHEME FOR HANDOVER<br />

E LAK ( N m || N s || N p ) from the adversary, the verification on the out-of-date N m at the<br />

MH us<strong>in</strong>g the new LAK’ and N m ' will fail.<br />

6.4.3 Impact of Network Corruption<br />

The traffic on the radio l<strong>in</strong>k is protected by the keys derived from the PMK <strong>in</strong> use,<br />

which is shared between the MH and the AN. The corruption of an AN may result <strong>in</strong> an<br />

<strong>in</strong>tended disclosure of PMK. This would make it possible for an adversary to eavesdrop<br />

on the radio l<strong>in</strong>k, and track the sensitive <strong>in</strong>formation to be delivered. Thus, the access<br />

security can be affected.<br />

In the PBAL, the nonce N m generated for request<strong>in</strong>g the FAT is encrypted us<strong>in</strong>g the<br />

key K hm shared between the MH and its HAAA as expla<strong>in</strong>ed <strong>in</strong> Table 6.1. The FAT<br />

vector FATV returned by the HAAA is protected with the key K hp known only to the<br />

HAAA and the FAP. Although the traffic on the radio l<strong>in</strong>k may be overheard, the<br />

disclosure of<br />

EK ( N m ) and the encrypted contents of the FAT will not cause a security<br />

hm<br />

threat. No parties other than the ones hold<strong>in</strong>g the keys between the HAAA and the FAP<br />

can correctly decrypt the enclosed security <strong>in</strong>formation used for fast authentication. The<br />

MH is unaware of the contents of the received FAT. Therefore, the risk of us<strong>in</strong>g a<br />

corrupted PMK by an adversary is limited to perform<strong>in</strong>g the attacks aforementioned <strong>in</strong><br />

Sec. 6.4.2.<br />

Although the corruption of PMK does not affect the PBAL fast authentication, it is still<br />

considered as a major security hole. In the PBAL, the session key renewal can be<br />

periodically <strong>in</strong>itiated by either a mobile user or the FAP as described <strong>in</strong> Sec. 6.3.4.<br />

Access network plays a role of a pass-through by forward<strong>in</strong>g the key renewal<br />

request/response between the mobile user and the FAP. This m<strong>in</strong>imises the impact of a<br />

corrupted AN on <strong>wireless</strong> communications. Moreover, the identity of the key renewal<br />

request orig<strong>in</strong>ator is always verified before proceed<strong>in</strong>g to produce a new PMK as<br />

illustrated <strong>in</strong> Figure 6.6 and Figure 6.7. Such orig<strong>in</strong>ation verification can make sure that<br />

the corruption of the serv<strong>in</strong>g PMK will not result <strong>in</strong> the compromise of a renewed PMK<br />

to be used <strong>in</strong> the future.<br />

- 130 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!