02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PROXY BASED AUTHENTICATION LOCALISATION SCHEME FOR HANDOVER<br />

6.6 Conclusion<br />

The past studies on fast authentication have focused on handover either with<strong>in</strong> the same<br />

network doma<strong>in</strong>, or between two network doma<strong>in</strong>s shar<strong>in</strong>g a trust association. To<br />

localise an authentication, their proposed solutions require that a secure channel<br />

between two po<strong>in</strong>ts of attachment <strong>in</strong> a handover should be available for transferr<strong>in</strong>g<br />

security context <strong>in</strong>formation. However, as the coexistence of multiple network operators<br />

is anticipated <strong>in</strong> the NG <strong>heterogeneous</strong> <strong>wireless</strong> networks, more and more handover<br />

operations may be performed between network doma<strong>in</strong>s without a trust association. For<br />

such k<strong>in</strong>d of handover, the authentication request is always delivered to the mobile’s<br />

home AAA server, because the current fast authentication solutions will not work.<br />

The proxy-based authentication localisation scheme PBAL is presented to address fast<br />

authentication <strong>in</strong> a handover tak<strong>in</strong>g place between two network doma<strong>in</strong>s without a trust<br />

association. The proposed PBAL scheme can provide a roam<strong>in</strong>g mobile user with<br />

localised authentication <strong>in</strong> a handover. The PBAL does not require any communications<br />

between two po<strong>in</strong>ts of attachment (sAN and nAN) before, dur<strong>in</strong>g and after a handover.<br />

By relay<strong>in</strong>g authentication authority to a third-party proxy, the PBAL avoids resort<strong>in</strong>g<br />

to a mobile user’s home AAA server for identity verification <strong>in</strong> a handover. As a result,<br />

handover signall<strong>in</strong>g delay is greatly reduced <strong>in</strong> a multi-operator environment. It was<br />

proven that the PBAL supports mutual authentication and security protection aga<strong>in</strong>st<br />

some known attacks such as replay attack and network corruption. It provides some<br />

additional security features like session key renewal, which makes sure that vulnerable<br />

<strong>wireless</strong> l<strong>in</strong>k can be better protected. In the PBAL, both authentication localisation and<br />

security enhancement can be conducted <strong>in</strong> a cost effective manner, s<strong>in</strong>ce a few round<br />

trips are needed. Generally, the PBAL can support fast and localised authentication<br />

without compromis<strong>in</strong>g security features.<br />

- 133 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!