unlicensed mobile access (uma) dasun weerasinghe school of engineering and mathematical sciences...

18
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

Upload: justice-fain

Post on 01-Apr-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

Unlicensed Mobile Access (UMA)

Dasun Weerasinghe

School of Engineering and Mathematical Sciences

City University

London

Page 2: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

Agenda

What is UMA

UMA Architecture

Security in UMAAuthentication

Encryption

EAP-AKA Authentication

Future Work

Page 3: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

What is UMA

UMA allows to access the mobile voice and data services of the cellular network over a Wireless LAN

Subscribers are enabled to roam and handover between cellular networks and wireless networks

UMA Technology specification was published in September 2004

3GPP approved the specification as “Generic Access to A/Gb interfaces”

Pilot project by Nokia in Finland

Page 4: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

What is UMA ( Contd..)

Page 5: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

UMA Architecture

Mobile devices access the Core Network through Unlicensed Mobile Access Network (UMAN).

UMAN has 3 major entities Unlicensed wireless network

IP access network

UMA Network controller (UNC)

UNC authorizes and authenticates the Mobile devices for accessing the Core Network

Page 6: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

UMA Architecture ( Contd..)

Page 7: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

UMA Security

Authentication Authenticate MS with UNC to make secure tunnel

Based GSM or UMTS credentials

Protocol of authentication is IKEv2

GSM : EAP-SIM or UMTS : EAP-AKA

Mutual Authentication of MS and Mobile Network

Session Key Generation – IK and CK

Page 8: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

UMA Security – EAP Authentication

Steps in Authentication ( EAP )MS establish a link with AP

Determines the UNC to be connected

Initiate the connection with UNC with IKE

UNC connects with the local AAA

Page 9: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

UMA Security - EAP Authentication (Contd..)

Local AAA linked to the Home AAA

EAP procedure is performed between MS and AAA

UNC is a relay for EAP messages

Page 10: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

EAP-AKA

Page 11: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

EAP-AKA steps

MS finds an AP

MS finds the UNC-SGW and initiates the IKEv2 authentication procedure

MS sends to NAI to UNC-SGW which contains IMSI

UNC-SGW communicates with local AAA

Local server determines the Home AAA by using the NAI. Routing path may include several AAA proxies

Leading digits in NAI indicates the authentication procedure is EAP - AKA

Page 12: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

EAP-AKA steps ( contd..)

AAA requests the user profile and UMTS authentication vectors from HSS

UMTS authentication vector consists with RAND, authentication part (AUTH), expected result, IK and CK

AAA send the EAP Request/AKA Challenge to UNC-SGW with RAND, AUTH, MAC ( message authentication key ) and re-authentication identity.

UNG-SGW forwards the EAP Request/AKA Challenge to MA

Page 13: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

EAP-AKA steps ( contd..)

MS runs the UMTS algorithm and verifies the AUTH. It computes the RES, IK, CK and calculates MAC using the generated IK and CKMS sends EAP Response/AKA Challenge with RES and MACAAA verifies the received MAC and compares RES with XRESAAA sends IK and CK to UNC-SGW for the communication with MSUNC-SGW informs the successful authentication to MS

Page 14: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

EAP-AKA Fast Re-Authentication

Used to reduce the network load due to the authentication

AAA server authenticates the user based on the keys derived by the last full authentication

Re-authentication ID is generated by the AAA in the full authentication process

Page 15: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

EAP-AKA Fast Re-Authentication (Contd..)

Page 16: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

EAP-AKA Fast Re-Authentication StepsMS initiates the IKEv2 authentication procedure

Re-Authentication identity is sent to the UNC-SGWUNC-SGW sends EAP Response/Identity to AAA with re-authentication Id AAA initiates a counter and sends EAP Request/AKA-Reauthentication message with counter value, MAC and re-authentication id for the next fast authentication.MS verifies the counter value and the MAC and send the EAP Response/AKA-Reauthentication with the same counter value and calculated MAC.AAA server verifies the counter value and MACEAP success message is sent to MS

Page 17: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

Encryption

CK is generated during the authentication process

Negotiated cryptographic algorithms are used.

Page 18: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

Future Work

Calls handing off between the cellular network and the wireless LAN with fast authentication processSSO from one UNC to another Introduce UNC to the Mobile Shopping Mall. UNC can be a web service. Introduce XML security to the communication between MS and UNCAuthentication of the UNC to the networkSome security holes in Fast authentication