02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DYNAMIC NEIGHBOUR TRUST INFORMATION RETRIEVAL FOR GLOBAL ROAMING<br />

the <strong>in</strong>formation about the implicit TRs of the two neighbour<strong>in</strong>g networks with a mobile<br />

user can be exchanged. This is applicable even when there is no direct trust association<br />

between the two neighbour<strong>in</strong>g networks. By analys<strong>in</strong>g handover history of a large<br />

number of mobile users, a network can dynamically obta<strong>in</strong> rich network trust<br />

<strong>in</strong>formation of its neighbours.<br />

In a peer-to-peer direct roam<strong>in</strong>g, one network can be directly <strong>in</strong>terconnected with<br />

another network via an <strong>in</strong>terwork<strong>in</strong>g gateway [20]. Alternatively, a roam<strong>in</strong>g broker<br />

network [53] can be utilised for assist<strong>in</strong>g roam<strong>in</strong>g, which supports collaboration<br />

between two networks be<strong>in</strong>g enabled through roam<strong>in</strong>g agreements. In this chapter, it is<br />

assumed that the roam<strong>in</strong>g broker network is to be used for global roam<strong>in</strong>g.<br />

Every time a mobile user attaches to a POA, it has to establish an implicit TR with the<br />

visited POA. This can be done by gett<strong>in</strong>g the mobile user authenticated to its home<br />

network. A roam<strong>in</strong>g broker network is used for <strong>in</strong>termediat<strong>in</strong>g AAA messages when the<br />

two networks are <strong>in</strong>directly <strong>in</strong>terconnected. Figure 4.1 illustrates how an implicit TR<br />

between a Mobile Host (MH) and a visited POA can be established us<strong>in</strong>g an efficient<br />

re-authentication method dur<strong>in</strong>g a handover. The fast re-authentication has been<br />

specified <strong>in</strong> the Extensible Authentication Protocol Method for the 3rd Generation<br />

Authentication and Key Agreement (EAP-AKA) [74], and applied <strong>in</strong> 3GPP’s<br />

specification [75]. The MH sends an EAP/Identity to the new POA (nPOA) to request<br />

attachment. The nPOA forwards this identity to the MH’s home AAA server (HAAA).<br />

The HAAA will respond to a recognised identity by provid<strong>in</strong>g a set of security<br />

credentials as a challenge to the MH. The HAAA and MH exchange their security<br />

credentials and verify each other’s identity <strong>in</strong> a set of round trips. Dur<strong>in</strong>g this process,<br />

better known as mutual authentication, the visited network (e.g. nPOA) plays an<br />

important role as shown <strong>in</strong> Figure 4.1. In summary, a mutual relation between a visited<br />

network and a mobile’s home network must exist if the mobile wants roam to the visited<br />

network.<br />

- 59 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!