02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SECURITY FOR HANDOVER ACROSS HETEROGENEOUS WIRELESS NETWORKS<br />

In a roam<strong>in</strong>g case, authentication, authorisation and account<strong>in</strong>g packets are routed<br />

between a NAS and an AAA server through one or more AAA proxies, which<br />

constitutes a proxy-cha<strong>in</strong><strong>in</strong>g architecture as shown <strong>in</strong> Figure 3.5. With proxy-cha<strong>in</strong><strong>in</strong>g,<br />

two or more adm<strong>in</strong>istrative entities are allowed to open their networks to each other's<br />

dialled-<strong>in</strong> users for roam<strong>in</strong>g [49]. The benefits of proxy-cha<strong>in</strong><strong>in</strong>g for roam<strong>in</strong>g has been<br />

summarised <strong>in</strong> six aspects: scalability improvement, authentication forward<strong>in</strong>g,<br />

capabilities adjustment, policy implementation, account<strong>in</strong>g reliability improvement,<br />

atomic operation <strong>in</strong> IETF specification RFC 2607 for Proxy Cha<strong>in</strong><strong>in</strong>g and Policy<br />

Implementation <strong>in</strong> Roam<strong>in</strong>g [60], and are supported by other proposals such as Wireless<br />

Shared Key Exchange (W-SKE) [53].<br />

In RADIUS, the procedures for proxy cha<strong>in</strong><strong>in</strong>g are def<strong>in</strong>ed to forward AAA packets<br />

between a NAS and a RADIUS server through a number of proxies as shown <strong>in</strong> Figure<br />

3.9. The NAS generates a request and sends it to Proxy 1. Proxy 1 exam<strong>in</strong>es and<br />

forwards the request to Proxy 2. Proxy 2 then forwards the request to the RADIUS<br />

Server. Both Proxy 1 and Proxy 2 may modify the attributes <strong>in</strong> the packet s<strong>in</strong>ce proxies<br />

are allowed to implement some local policies. On the reverse path, the RADIUS Server<br />

generates a reply and sends it to Proxy 2. After receiv<strong>in</strong>g the reply, Proxy 2 matches it<br />

with the request it had sent, and forwards the reply to Proxy 1. Proxy 1 checks the reply<br />

for match<strong>in</strong>g, and forwards the reply to the NAS.<br />

Figure 3.9 Proxy cha<strong>in</strong><strong>in</strong>g <strong>in</strong> RADIUS (RFC 2607 [60])<br />

The choice of which server receives the forwarded request is based on the<br />

authentication "realm". The authentication realm can be the realm part of a NAI. A<br />

RADIUS server can function as both a forward<strong>in</strong>g server and a remote server: serv<strong>in</strong>g<br />

as a forward<strong>in</strong>g server for some realms and a remote server for other realms accord<strong>in</strong>g<br />

to the RADIUS specification [49]. As this <strong>in</strong>dicates, the roam<strong>in</strong>g relationship path (e.g.<br />

the path to the <strong>next</strong> proxy towards the RADIUS server) is determ<strong>in</strong>ed by the network<br />

- 50 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!