02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SECURITY FOR HANDOVER ACROSS HETEROGENEOUS WIRELESS NETWORKS<br />

RES K<br />

� f 2 ( RAND)<br />

, and sends it back to the serv<strong>in</strong>g network (STEP 5). The serv<strong>in</strong>g<br />

network verifies the identity of the MH by compar<strong>in</strong>g the user’s response RES with the<br />

expected response XRES. If the two values are identical, the MH will be accepted for<br />

access<strong>in</strong>g the network.<br />

Figure 3.2 Authentication procedures <strong>in</strong> UMTS network<br />

3.2.3 Authentication <strong>in</strong> IEEE 802.11<br />

IEEE 802.11 standard [46] has def<strong>in</strong>ed two security services: the authentication service<br />

and the Wired Equivalent Privacy (WEP) mechanism. Both of the services have been<br />

classified as pre-RSNA (Robust Security Network Association) security <strong>mechanisms</strong>,<br />

and proved to be vulnerable [42]. To elim<strong>in</strong>ate the security flaws of its ancestor 802.11,<br />

a new standard IEEE 802.11i [42] has been developed. In addition to provid<strong>in</strong>g the<br />

legacy security services of 802.11, e.g. WEP, 802.11i enhances key management and<br />

encryption algorithms by <strong>in</strong>corporat<strong>in</strong>g IEEE 802.1X [47], a port-based network control<br />

mechanism.<br />

IEEE 802.1X def<strong>in</strong>es a means of authentication and authorisation at l<strong>in</strong>k layer for IEEE<br />

802 Local Area Network (LAN). As described <strong>in</strong> the 802.1X standard [47], both the<br />

supplicant and the authenticator have a Port Access Entity (PAE), through which the<br />

authentication between the two parties can be performed. The PAEs operate the<br />

algorithms and protocols associated with the authentication <strong>mechanisms</strong>. The<br />

- 40 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!