21-08-0080-01-0sec1 ieee 802.21 media independent handover dcn:...

36
21-08-0080-01-0sec 1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling- during-handovers-tutorial Title: Media-Independent Handover Security Tutorial Date Submitted: March 17, 2008 Presented at IEEE 802.21 session #25 in Orlando Authors or Source(s): Yoshihiro Ohba (Toshiba), Marc Meylemans (Intel), Subir Das (Telcordia Technologies) Abstract: This document provides a tutorial on Media-Independent Handover Security

Upload: jocelyn-stack

Post on 27-Mar-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 1

IEEE 802.21 MEDIA INDEPENDENT HANDOVER

DCN: 21-08-0080-01-0sec-security-signaling-during-handovers-tutorial

Title: Media-Independent Handover Security Tutorial

Date Submitted: March 17, 2008

Presented at IEEE 802.21 session #25 in Orlando

Authors or Source(s):

 Yoshihiro Ohba (Toshiba), Marc Meylemans (Intel), Subir Das (Telcordia Technologies)

Abstract: This document provides a tutorial on Media-Independent Handover Security

Page 2: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 2

IEEE 802.21 presentation release statementsThis document has been prepared to assist the IEEE 802.21 Working Group. It is

offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein.

The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.21.

The contributor is familiar with IEEE patent policy, as outlined in Section 6.3 of the IEEE-SA Standards Board Operations Manual <http://standards.ieee.org/guides/opman/sect6.html#6.3> and in Understanding Patent Issues During IEEE Standards Development http://standards.ieee.org/board/pat/guide.html> 

IEEE 802.21 presentation release statementsThis document has been prepared to assist the IEEE 802.21 Working Group. It is

offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein.

The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.21.

The contributor is familiar with IEEE patent policy, as stated in Section 6 of the IEEE-SA Standards Board bylaws <http://standards.ieee.org/guides/bylaws/sect6-7.html#6> and in Understanding Patent Issues During IEEE Standards Development http://standards.ieee.org/board/pat/faq.pdf> 

Page 3: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 3

Agenda

• Overview of IEEE 802.21

• Security Issues during Handover • Network Access Security model• Intra-technology Handovers

• Overview of existing link-layer security signaling optimizations• Inter-technology Handovers

• Overview of potential approaches• Proposed Directions

Page 4: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 4

Overview of 802.21

Please refer to the Tutorial in July 2006http://www.ieee802.org/21/Tutorials/802%2021-IEEE-Tutorial.ppt

Page 5: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 5

IEEE 802.21 StandardMedia Independent Handover Services

• Optimize Layer 3 and above Handovers • (802.3 <> 802.11 <> 802.16 <> Cellular)

• Key Services• L2 Triggers and Measurement Reports

• 802.11, 802.16 radios• Enables Network Initiated Handovers

• Information Service• Optimum Network Discovery and Selection• Lower Power operation for Multi-Radio devices

• Handover Messages• Between Mobile Node (MN) <>Point of Service (PoS) (e.g., BS/AP) • Between PoS1 <> PoS2 (Resource Query, HO Indication)

• For More Information ( www.ieee802.org/21)

Page 6: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 6

IEEE 802.21: Overview

L2 Triggers & MeasurementsState Change

PredictiveNetwork Initiated

Network InformationAvailable NetworksNeighbor MapsNetwork ServicesHandover Commands

Client InitiatedNetwork Initiated

Vertical Handovers

802.21 MIH Function

Protocol and Device Hardware

Applications (VoIP/RTP)

Connection Management

WLAN Cellular WMAN

L2 Triggers

and Events

Information Service

Mobility Management Protocols

Smart Triggers

Information Service

Handover Messages

Handover Management

Handover Policy

Handover Messages IE

EE

80

2.2

1IE

TF

Page 7: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 7

General MIH Reference Model and Service Access Points (SAPs)

MIH

_LIN

K_S

AP

MIH

_SA

P

Media-Independent Handover Function

(MIHF)

RemoteMIHF

MIH

_NE

T_S

AP

MIH Protocol Transport(Layer 2 or

Layer 3)

LLC_SAP

MIH UsersMIH Users

Layer 3 or Higher Layer

Mobility Protocol

Link Layer(IEEE 802.3, IEEE 802.11, IEEE 802.16)

SAPs defined in IEEE 802.21 Specification

MIH

_NE

T_S

AP

MIH Services

(ES, CS, IS)

MIH ProtocolMIH Services(ES, CS, IS)

Page 8: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 8

Technical Challenges in Handovers

Challenge Motivation

Efficient Network Discovery and Selection

Inter-Network Neighbor Advertisements reduce power consumption in scanning. The 802.11 module will only turn on if 802.11 coverage is available

Low Latency HandoversRequires inter-RAT interface. Speeds up handoff procedure (passing security keys, resource reservation).

Service Provider’s Control in Target Network Selection

Enables service providers to enforce handoff policies and decisions. Requires inter-RAT measurement reporting

Service ContinuityRequires a L3 anchor and L3 mobility management signaling. An inter-RAT interface between access gateways can be used for this purpose.

Target Preparation is the Key aspect of Optimized Handovers

Page 9: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 9

Key Interfaces for Handovers

Mobile Station(MS)

AG-RAT1

AG-RAT2

RAG

Common Core

HAAAA

HSSHLR

InformationServer

RS

RS

AG: Access Gateway

RAT: Radio Access Technology

HA: Home Agent

2. Inter-Access Gateway I/f Pass network context from Source to Target forOptimized Handovers

1. Inter-RAT Neighbor Advertisements.

3. Network-initiated Handovers Require Measurement Reports and H/O messages over Core Network and air-interface

Page 10: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 10

802.21 History & Timeline

1H 2004

2H 2004

802.21 WG Created

Call For Proposals

1H 2005

14 Initial Proposals

2H 2005

1H 2006

Down selection Initial 802.21 Draft Text

2H 2006

Initiate Amendments to 802.11u, 802.16g. IETF (MIPSHOP) on L3

Year 2007

Sponsor Ballot

Year 2008

802.21 Spec Ratified*

2009-2010

802.21 Deployment*

WG Letter Ballot

*Projected Timelines

Two New Study Groups (July – 2007)- Security in Handovers- Multi-Radio Power Management

Page 11: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 11

Security Issues During Handover

Page 12: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 12

Network Access Security Steps

Step 1: Network access authentication

Step 2: Secure association

Step 3: Access control and ciphering

Entities involved:• MN: Mobile Node• PoA: Point of Attachment (e.g., Access

Point)• AS: Authentication Server (e.g., AAA

server)

MN changes its PoA due to handover

MN PoA AS

Step 1: Network Access Authentication

Step 2: Secure Association

Network access security is all about how to bind the three steps together to provide appropriate security properties for network access with the use of security associations (SAs)

Step 3: Access Control and Ciphering

Page 13: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 13

Security Associations (SAs)SAmp: An SA between MN and PoA

SAma: An SA between MN and AS

SApa : An SA between PoA and AS

• SAma and SApa are pre-established based on long-term credentials• SAmp is dynamically established with creation of a Session Key

MN PoA

ASSAma SApa

SAmp

Page 14: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 14

Step 1 - Network Access Authentication

• MN and PoA authenticate each other with the help of AS and establish SAmp based on SAma and SApa

• EAP (Extensible Authentication Protocol) exports two keys:• MSK (Master Session Key) - distributed from AS to PoA• EMSK (Extended Master Session Key) – used for other purpose

• EAP is transported at link-layer as well as higher layers • Link-layer EAP transport in IEEE 802: 802.1X, PKMv2• Higher-layer EAP transport: PANA (Protocol for carrying Authentication for

Network Access), IKEv2 (Internet Key Exchange version 2), RADIUS/Diameter

MN* PoA* AS*

EAP-Request

EAP-Response AAA{EAP-Response}

AAA{EAP-Request}EAP-Request

:AAA{EAP-Success,MSK}EAP-Success

*) Note: MN, PoA and AS are EAP peer, authenticator and server, respectively, and represent one deployment model.:

Page 15: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 15

Step 2 – Secure Association

• A link-layer specific procedure to attach to a PoA in a secure manner

Step 2-1: Provide and verify proof of each other’s possession of the session key corresponding to SAmp

Step 2-2: Create access control filters and ciphering keys • The ciphering keys are used in Access Control and

Ciphering (Step 3)

Page 16: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 16

Step 3 – Access Control and Ciphering

• Access control enforces link-layer data frames to be exchanged between MN and PoA only after a successful run of Network Access Authentication and Secure Association

• Link-layer data frames are cryptographically protected with the use of ciphering keys depending on underlying link-layer technologies

Page 17: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 17

Security Signaling Latency

• Approximately 90% of the latency originates from the EAP signaling during network access authentication (full authentication)

• EAP authentication takes on average 100s of ms, while the layer 2 key management (4-way handshake (HS) in 802.11 and 3-way handshake in 802.16) takes on average less than 10ms.

802.11 802.16

MN: Mobile NodeAP: Access PointBS: Base StationAAA: AAA server

Page 18: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 18

Handover Scenarios

• Two Common Cases• Intra-technology Handovers• Inter-technology Handovers

Page 19: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 19

Intra-Technology Handovers

Page 20: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 20

Solutions Available Today

• Several handover solutions available today are centered around intra-technology handovers (AP to AP, BS to BS)

• IEEE 802.11 solutions:• Pre-authentication (as defined in 802.11i)• Fast BSS Transition (under Sponsor Ballot in TGr)

• IEEE 802.16 solution:• Handover Process Optimization (as defined in 802.16e)

• IEEE 802.1 solution• Roaming (reconnect) solution (under letter Ballot in

802.1af)

• Main goal of the above solutions is to decrease the time it takes to do an EAP-based network access authentication

Page 21: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 21

802.11i - Pre-authentication

AAA server

AP1 AP2

• STA Associated to AP1, after full 802.11i authentication

• Data traffic flows via AP1

• STA selects AP2 as Target, and initiates pre-Authentication for AP2

• EAP Authentication is sent via AP1

• AP2 receives MSK from EAP Server

• STA derives MSK for AP2

• STA performs 802.11i 4-Way Handshake with AP2, using MSK(STA, AP2)

• Data Traffic Flows via AP2

• Transition complete

MSK

MSK

802.

11i 4

-W

ay

Han

dsha

ke

PTK

PTK

802.11 AccessNetwork

Internet

Conceptual Flow

STA

Page 22: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 22

802.11r – Fast BSS Transition• STA Associated to AP1• Data traffic flows via AP1• STA Moves and Selects AP2 as

Target• 802.11r Auth Request

• Request PMK-R1AP2 from R0KH

• Derive PMK-R1AP2 for AP2

• Response w/ PMK-R1AP2 to AP2

• 802.11r Auth Response• AP2 & STA Derive PTK• 802.11r Reassociation Request

and Response • Data traffic flows via AP2• Transition complete

802.11 MobilityDomain

AAA server

AP1 AP2

PMK-R0

PMK-R1 AP2 PMK-R1 AP2

PTK

PMK-R0

PMK-R1 AP2

PTK

Internet

Conceptual Flow

STA

Page 23: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 23

802.16e – HO Process optimization

• MS connected with BS1, data traffic flows

• MS sends HO request (HO optimization bits set, preferred BSs) to BS1

• BS1 forwards HO request to BS2

• BS2 sends HO response back to BS1

• BS1 sends HO response back to MS

• MS sends HO indication with BS2 as target

• BS1 forwards MS info and connection context to BS2 (handover TEKs, associated counters, negotiated capabilities, CID update,…)

• MS ranges and attaches with BS2

• Data traffic flows via BS2

AAA server

802.16 Accessnetwork

BS1 BS2

Corenetwork

Conceptual Flow

Internet

AK1 AK2

MS

Page 24: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 24

IEEE P802.1af and 802.1AE

• IEEE P802.1af – a new revision of 802.1X for port access control, it provides

• Network access authentication, secure association and access control for LAN/MAN

• Network discovery

• Allows a session key that was established between a Host and a Network Access Point to be cached and reused when reconnecting back to the Network Access Point after moving to another Network Access Point

• IEEE 802.1AE - MAC Security• Provides ciphering for LAN/MAN

Page 25: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 25

Inter-Technology Handovers

Page 26: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 26

Dual and Single Radio Handovers

• Dual radio handover: The MN has two radios, and both radios are transmitting at the same time during handovers. Target preparation is done via the target radio.

• Allows a ‘make-before-break’ handover and as such service disruption can be avoided.

• Single radio handover: The MN has two radios, but only one radio is transmitting at a time due to co-existence, interference, battery issues. Target preparation is done using the source radio.

• Limited to ‘break-before-make’ handover and as such service disruption cannot be avoided without additional optimization

Page 27: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 27

Dual-radio Handover Flow

AAA server

Core Network

Access Network 1

Access Network 2

• MN connected with Radio 1 to AN1, and an application session is active

• MN moves, Radio 2 On

• MN decides to perform HO to AN2

• MN authenticates with AN2 using Radio 2

• Subsequent HO procedures follow

•Including IP mobility signaling and resource reservation and so on

• Application session continuity is maintained on AN2

• Radio 1 off or idle

Conceptual Flow

Page 28: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 28

AAA server

Core Network

Access Network 1

Access Network 2

Single-radio Handover Flow• MN connected with Radio 1

to AN1, and an application session is active

• MN moves and decides to perform HO to AN2

• MN authenticates with AN2 via AN1

• Subsequent HO procedures follow

•Including IP mobility signaling and resource reservation and so on

• Radio 1 Off/Idle• Radio 2 active• MN attaches to AN2• Application session continuity

is maintained on AN2

Conceptual Flow

Page 29: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 29

What is the problem?

• Security-related signaling can increase the latency significantly in single-radio handover efforts and in many cases service continuity can not be met

• Handover techniques that assume concurrent radio usage cannot be used

• Even for dual-radio devices it might make sense to reduce the security-related signaling, as it decreases the time that both radios need to be active and thus can increase battery life

• In addition, handovers between networks within the same AAA domains or different AAA domains pose different challenges

Page 30: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 30

Potential Approach for Intra-AAA-domain Handover – Key Hierarchy-based Transition

(1/3)• Establish a key hierarchy through full authentication upon entry into the

AAA domain

• The key hierarchy may span multiple link-layer technologies

• Network access authentication is based on exchanging proof of possession of the root key between MN and the root key holder through the PoA

Root Key

Session Key for PoA_1

Session Key for PoA_2

… Session Key for PoA_N

Page 31: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 31

Potential Approach for Intra-AAA-domain Handover – Key Hierarchy-based Transition (2/3)

• ERP (EAP Extensions for EAP Re-authentication Protocol) is defined in IETF for Key Hierarchy-based Transition

• The server for ERP can be in a visited domain

• ERP requires one AAA message roundtrip

AAA domain XRe-authentication Server

(AAA server/proxy)

ERP signaling

Page 32: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 32

Potential Approach for Intra-AAA-domain Handover – Key Hierarchy-based Transition

(3/3)

• In this approach, ERP is proactively performed (proactive re-authentication)

• No AAA roundtrip after switching to the target PoA

AAA domain X

Proactive re-authentication

Secure Association

Re-authentication Server(AAA server/proxy)

Page 33: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 33

Potential Approach for Inter-AAA-Domain Handover – Authentication-based Transition

• Since networks are in different AAA domains, in general full authentication can not be avoided

• There is no reason for the new domain to “trust” keys from the old domain, and no reason for mobile device to “trust” the new domain with keys it used with its old domain

• Roaming agreements (SLAs) may exist between the two networks, but home operator might still require the user to authenticate with the home network (AAA) because of security or policy reasons

• A pre-authentication solution is needed that works across multiple AAA domains

AAA domain X AAA domain Y

EAP server

EAP (RFC 3748)signaling

Secure Association

Page 34: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 34

Proposed Direction• Proactive authentication is the promising approach to reduce authentication

and key establishment signaling latency

• Needed for secure service continuity across different link-layer technologies, AAA domains

• Use existing media-specific Secure Association mechanisms

• Proactive authentication can be based on proactive re-authentication, and pre-authentication

• Proactive authentication requires an EAP transport • The solution that works independent of link-layer technologies

• Our main scope is IEEE 802 technologies, but solution could be applied to handovers to other technologies

Page 35: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 35

How 802.21 can Solve the Problem?

• Define proactive authentication commands that can start authentication and key establishment before the handover commitment / completion

• Define media independent transport to carry proactive authentication command on top of the MIH protocol

• The transport must work across multiple LANs• The transport needs to carry not only EAP message but also additional

information for binding between proactive authentication entities and link-layer entities

• Define triggers for proactive authentication

• Define information elements relating to proactive authentication

• Define key install commands

Page 36: 21-08-0080-01-0sec1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0080-01-0sec-security-signaling-during-handovers- tutorial Title: Media-Independent

21-08-0080-01-0sec 36

Thank You!