13.07.2015 Views

Praise for Fundamentals of WiMAX

Praise for Fundamentals of WiMAX

Praise for Fundamentals of WiMAX

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10.6 Authentication and Security Architecture 347AAA Server and the authenticator in ASN. Depending on the type <strong>of</strong> credential, a variety <strong>of</strong> EAPASNVisited CSNHome CSNMS14NAS2a3bAAA ProxyServer2b3aAAA ServerFigure 10.5 Generic AAA roaming modelSupplicantAuthenticationRelayAuthenticatorAuthenticationServerMSBS(ASN)NAS(ASN)AAAProxy(s)AAA Server(Home CSN)EAP-TLS, PEAP, EAP-TTLS, EAP-AKA, etc.EAPPKMv2Authentication RelayProtocolAAA Protocol802.16Authentication RelayEncapsulating ProtocolUDP/IPFigure 10.6 Protocol stack <strong>for</strong> user authentication in <strong>WiMAX</strong>schemes, including EAP-AKA (authentication and key agreement), EAP-TLS, EAP-SIM, andEAP-PSK (preshared key), may be supported. It is also possible to optionally secure the transport<strong>of</strong> end-to-end user authentication within a tunnel by using protocols such as tunneled transportlayersecurity (TTLS). Figure 10.6 depicts the protocol stack <strong>for</strong> PKMv2 user authentication.When both user and device authentications need to be per<strong>for</strong>med and both authenticationsterminate in different AAA servers, PKMv2 double-EAP mode is used. Here, user EAP authenticationfollows device authentication be<strong>for</strong>e the MS is allowed access to IP services. If the sameAAA server is used <strong>for</strong> both, the process could be shortened by doing joint device and userauthentication.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!