02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SECURITY FOR HANDOVER ACROSS HETEROGENEOUS WIRELESS NETWORKS<br />

Authentication Centre (AuC) and the Subscriber Identity Module (SIM). Confidentiality<br />

and anonymity on the radio path is provided by encrypt<strong>in</strong>g data streams between mobile<br />

user and access network. However, GSM was not designed to protect aga<strong>in</strong>st active<br />

attacks on the radio path, because they would require an attacker to masquerade as a<br />

GSM network [44].<br />

In a GSM network, authentication is often <strong>in</strong>volved <strong>in</strong> many system operations such as<br />

mobile registration, mobile handover and so forth. To <strong>in</strong>itiate an authentication process,<br />

the AuC <strong>in</strong> the home network generates a 128-bit random number (RAND). This<br />

random number RAND will be sent to the Mobile Host (MH) as a challenge. Then, both<br />

the MH and the AuC produce a 32-bit signed response SRES by apply<strong>in</strong>g a vendor-<br />

specific A3 algorithm, 3( , i ) K RAND A SRES � . The MH sends its SRES to the HLR for<br />

verification. The HLR checks whether the SRES from the MH is identical to what it has<br />

obta<strong>in</strong>ed from the AuC. Alternatively, the SRES and the RAND could be provided to the<br />

VLR <strong>in</strong> advance. In this case, the SRES comparison can be done locally at the VLR on<br />

the visited network.<br />

If the MH is accepted for access, an encryption key K c is generated by another vendor-<br />

specific algorithm A8, K c � A8(<br />

RAND,<br />

K i ) . The K c is produced by the MH and the<br />

AuC separately. Then, the AuC sends its copy of K c to the visited network. The visited<br />

network applies an A5 encryption algorithm to cipher the data streams between the BS<br />

and the MH. The cipher<strong>in</strong>g * � A5(<br />

K , F ) XOR data will be applied on both<br />

data c n<br />

directions. F n is a 22-bit frame number, and 114-bit data are used as <strong>in</strong>put.<br />

Although GSM provides many security measures to protect aga<strong>in</strong>st some typical attacks<br />

such as eavesdropp<strong>in</strong>g, unauthorised access and masquerade, it is still vulnerable to<br />

false base station attacks [44]. As the costs of mobile base equipments reduce greatly<br />

and such k<strong>in</strong>d of attacks become easier to implement, GSM mobile users would<br />

<strong>in</strong>evitably be at a risk when roam<strong>in</strong>g globally.<br />

Mutual Authentication Method<br />

- 37 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!