13.07.2015 Views

Praise for Fundamentals of WiMAX

Praise for Fundamentals of WiMAX

Praise for Fundamentals of WiMAX

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10.7 Quality-<strong>of</strong>-Service Architecture 349fer between the BS and the MS is done via a three-way handshake. First, the BS transmitsthe SA-TEK Challenge message, which identifies an AK to be used <strong>for</strong> the SA, andincludes a unique challenge. In the second step, the MS transmits an SA-TEK Requestmessage after receipt and successful HMAC/CMAC verification <strong>of</strong> an SA challenge fromthe BS. The SA-TEK-Request message is a request <strong>for</strong> SA descriptors identifying the SAsthe requesting MS is authorized to access and their particular properties. In the third step,the BS transmits the SA-TEK Response message identifying and describing the primaryand static SAs the requesting MS is authorized to access.7. Generation and transfer <strong>of</strong> traffic encryption keys: Following the three-way handshake,the MS requests the BS <strong>for</strong> two TEKs each <strong>for</strong> every SA. The BS randomly generatesa TEK, encrypts it using the secret symmetric key encryption key (KEK), and transfersit to the MS.8. Service flow creation: Once the TEKs are established between the MS and the BS, serviceflows are created, using another three-way handshake. Each service flow is thenmapped onto an SA, thereby associating a TEK with it.10.6.3 ASN Security ArchitectureWithin the ASN, the security architecture consists <strong>of</strong> four functional entities: (1) authenticator,which is the authenticator defined in the EAP specifications (RFC 4017); (2) authenticationrelay, which is the functional entity in a BS that relays EAP packets to the authenticator via anauthentication relay protocol; (3) key distributor, which is the functional entity that holds thekeys (both MSK and PSK 6 ) generated during the EAP exchange; and (4) key receiver, whichholds the authentication key and generates the rest <strong>of</strong> the IEEE 802.16e keys. Figure 10.8 showsthe two deployment models <strong>for</strong> these security-related functional blocks within the ASN. One isthe integrated model, whereby all the blocks are within the BS, as in ASN pr<strong>of</strong>ile B. The alternativemodel has the authenticator and the key distributor in a separate stand-alone entity or in theASN-GW (as in ASN Pr<strong>of</strong>ile A and C). For the integrated model, the Authentication Relay Protocoland the AK Transfer Protocol (see Section 7.4.5 <strong>of</strong> [3]) are internal to the BS. For thestand-alone model, they are exposed and must comply with the standards.10.7 Quality-<strong>of</strong>-Service ArchitectureThe QoS architecture framework developed by the <strong>WiMAX</strong> Forum extends the IEEE 802.16eQoS model by defining the various QoS-related functional entities in the <strong>WiMAX</strong> network andthe mechanisms <strong>for</strong> provisioning and managing the various service flows and their associatedpolicies. The <strong>WiMAX</strong> QoS framework supports simultaneous use <strong>of</strong> a diverse set <strong>of</strong> IP services,such as differentiated levels <strong>of</strong> QoS on a per user and per service flow basis, admission control,and bandwidth management. The QoS framework calls <strong>for</strong> the use <strong>of</strong> standard IETF mechanisms<strong>for</strong> managing policy decisions and policy en<strong>for</strong>cement between operators.6. MSK is delivered by the AAA Server, and the PSK is generated locally.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!