13.07.2015 Views

Praise for Fundamentals of WiMAX

Praise for Fundamentals of WiMAX

Praise for Fundamentals of WiMAX

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10.6 Authentication and Security Architecture 345ble, and mobile access dynamic allocation from either the home or the visited CSN is allowed,depending on roaming agreements and the user subscription pr<strong>of</strong>ile and policy.To support IPv6, the ASN includes an IPv6 access router (AR) functionality, and the MSobtains a globally routable IP address from the AR. When using mobile IPv6, the MS obtainsthe care-<strong>of</strong> address (CoA) from the ASN, and a home address (HoA) from the home CSN. TheMS may use either the CoA or the HoA as its PoA address, depending on whether it routes packetsdirectly to correspondent nodes (CNs) or via the home agent (HA) in the CSN. When usingIPv6, static IP address, stateful autoconfiguration based on DHCPv6 (RFC 3315), or statelessaddress autoconfiguration (RFC 2462) is allowed. When Mobile IPv6 is used, the HoA isassigned via stateless DHCP. For stateful configuration, the DHCP server is in the serving CSN,and a DHCP relay may exist in the network path to the CSN. For stateless configuration, the MSwill use neighbor discovery or DHCP to receive network configuration in<strong>for</strong>mation.One known issue with the use <strong>of</strong> IPv6 in <strong>WiMAX</strong> stems from the lack <strong>of</strong> link-local multicastsupport in IEEE 802.16e air-interface. IPv6 has several multicast packets, such as neighborsolicitation, neight advertisement, router solicitation and router advertisement, that have a linklocalscope. Since, packet transmission in IEEE 802.16e is based on a connection identifier(CID) as opposed to the 48-bit hardware MAC address as is assumed by conventional IPv6 andRFC 2464, there is a need to define new mechanisms to share multicast CIDs among multicastgroup members in a <strong>WiMAX</strong> network.10.6 Authentication and Security ArchitectureThe <strong>WiMAX</strong> authentication and security architecture is designed to support all the IEEE802.16e security services, using an IETF EAP-based AAA framework. In addition to authentication,the AAA framework is used <strong>for</strong> service flow authorization, QoS policy control, and securemobility management. Some <strong>of</strong> the <strong>WiMAX</strong> Forum specified requirements that the AAA frameworkshould meet are as follows:• Support <strong>for</strong> device, user, and mutual authentication between MS/SS and the NSP, based onPrivacy Key Management Version 2 (PKMv2) as defined in IEEE 820.16e-2005.• Support <strong>for</strong> authentication mechanisms, using a variety <strong>of</strong> credentials, including sharedsecrets, subscriber identity module (SIM) cards, universal SIM (USIM), universal integratedcircuit card (UICC), removable user identity module (RUIM), and X.509 certificates,as long as they are suitable <strong>for</strong> EAP methods satisfying RFC 4017.• Support <strong>for</strong> global roaming between home and visited NSPs in a mobile scenario, includingsupport <strong>for</strong> credential reuse and consistent use <strong>of</strong> authorization and accountingthrough the use <strong>of</strong> RADIUS in the ASN and the CSN. The AAA framework shall alsoallow the home CSN to obtain in<strong>for</strong>mation, such as visited network identity, from the ASNor the visited CSN that may be needed during AAA.• Accommodation <strong>of</strong> mobile IPv4 and IPv6 security associations (SA) management.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!