| 研究生: |
李建緯 Li, Jian-Wei |
|---|---|
| 論文名稱: |
無線行動網路中支援認證者快速轉移之網路存取控制 Network Access Control with Fast Authenticator Transition over Wireless Mobile Networks |
| 指導教授: |
黃崇明
Huang, Chung-Ming |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2009 |
| 畢業學年度: | 97 |
| 語文別: | 英文 |
| 論文頁數: | 137 |
| 中文關鍵詞: | 認證 、認證者轉換 、叢集鏈 、靴帶式認證 、情境轉移 、擴展認證協定 、跨基本服務區的移動 、IP多媒體子系統 |
| 外文關鍵詞: | IP multimedia subsystem (IMS), IMS AKA, handoff, SIP, CSCF, EAP, context transfer, BSS transition, cluster-chain, CAPWAP, authenticator transition, bootstrap, 3GPP AKA, authentication |
| 相關次數: | 點閱:176 下載:4 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨時隨地可進行的網路服務仰賴於同時包含多種無線通訊技術的無線行動網路;然而,無線行動網路將資料傳輸在空氣中,比在有線網路的環境下更容易遭受安全性的威脅;除此之外,無線行動網路允許行動用戶能夠依照需求切換到其他的基地台或是服務提供者,因此有了認證者(authenticator)轉換的需求;再者,為了讓行動用戶能夠不受到切換基地台或服務提供者時所產生的影響,因而有快速切換基地台或服務提供者的需求。綜觀上述,支援認證者快轉移的網路存取控制機制在無線行動網路中有其存在之必要性。本篇論文針對網路存取控制機制,提出五個適用在無線行動網路的網路存取控制機制;以應用層存取安全、網路存取安全以及鏈結層存取安全三個面向分別說明如下:(一)應用層存取安全:第三代行動通訊系統(3G)中,IP多媒體子系統(IP multimedia subsystem;IMS)提供行動用戶多媒體服務的控制,在存取IMS應用服務前,行動用戶必須通過3G網路連結與IMS的兩道身份認證程序。這兩道身份認證程序都是以3GPP所制定的認證與金鑰協議機制(authentication and key agreement;AKA)為基礎。兩道認證程序中大部分的動作是重覆的,因而造成了效率上的問題。因此,本論文中提出了Evolutionary IMS AKA (E-IMS)與One-pass IMS AKA,不但可保有原有的安全特性,亦可比原本的方法最多增進百分之五十效率。(二)網路存取安全:本論文提出了3G與無線區域網路(Wireless LAN;WLAN)的整合機制,讓行動用戶能夠在已經擁有3G用戶帳號的情況下連結上WLAN,具有單一帳號的好處。所提出的整合機制運用了目前3GPP、IETF與IEEE 802.11i中廣泛被使用的協定,因此能簡單的建立此整合機制。而且在WLAN中,擴展認證協定(Extensible Authentication Protocol;EAP)的認證方法具有彈性,不限制單一認證方法。除此之外,與3GPP所制定的整合機制相比,本論文所提出的機制擁有較少的認證訊號花費。(三)鏈結層存取安全:為了讓行動用戶在WLAN中能夠快速地進行接取點(Access point;AP)切換,因此本論文提出了叢集鏈(cluster-chain)的結構來協助行動用戶安全資訊被事先傳送到將切換至的目的接取點,讓行動用戶與先前接取點的安全關係可快速地轉移到目的接取點。本論文同時將此機制運用到自治(autonomous)架構與中控(centralized)架構的WLAN中。
Wireless mobile networks, which contain various wireless communication technologies, can provide Internet services anytime and anywhere. However, wireless mobile networks rely on open and public transmission media. It results in that further security vulnerabilities are raised in addition to the security threats found in regular wired networks. Besides, mobile user may handoff/transit to other base stations or service providers, and meanwhile network access control mechanisms need to be raised. It results in an authenticator transition delay. Therefore, how to accelerate network access control mechanisms for facilitate authenticator transition is critical issue in wireless mobile networks. This dissertation studies network access control mechanisms, and then proposes five network access control mechanism supporting fast authenticator transition on wireless mobile networks. According to application access security, network access security, and link layer access security, the proposed mechanisms are as follows:
(I) Application access security: In UMTS IP multimedia subsystem (IMS), even when an IMS subscriber has passed the packet-switch domain authentication, the IMS subscriber's identity must be confirmed by the IMS authentication again before accessing IMS services. Both the packet-switch domain and IMS authentications are necessary for the IMS subscriber. This is the referred to as a two-pass authentication. However, the packet-switch domain authentication is carried out by the authentication and key agreement (AKA) of the 3rd Generation Partnership Projects (3GPP), called 3GPP AKA; the IMS authentication is carried out by IMS AKA. Since IMS AKA is based on 3GPP AKA, almost all of the operations are the same. It is inefficient because almost all involved steps in the two-pass authentication are duplicated. Hence, the one-pass authentication was proposed to increase the efficiency of the IMS authentication. Unfortunately, the one-pass authentication has some security problems and loses the mutual authentication and key agreement capabilities. Therefore, in this dissertation, an evolutionary IMS AKA (E-IMS AKA) and a one-pass IMS AKA in the IMS authentication are proposed to replace the IMS AKA. The proposed schemes not only adheres to the security requirements of IMS AKA, but also can be carried out in one round-trip.
(II) Network access security: Since the relationship between the 3G mobile data network and WLAN is complementary in terms of service coverage and data transmission rate, integration of 3G mobile network and WLAN can offer subscribers higher speed wireless service in hot spots and ubiquitous connectivity in 3G mobile data network. In this dissertation, we propose an authentication mechanism over the loose coupled integration mechanism using a cross-layer bootstrap. The benefits of the proposed mechanism are (a) integrating UMTS network and WLAN using the existent protocols defined in 3GPP, IETF and IEEE 802.11i, (b) the use of the EAP authentication method is flexible, (c) reduction of the authentication signaling when a subscriber roams from one access point (AP) to another AP, and (d) user identity privacy protection.
(III) Link layer access security: The latency of the basic service set (BSS) transition process in WLAN is much higher than 50ms. Since the bearable maximum delay is 50ms in multimedia applications, e.g., voice over IP (VOIP), such large handoff gap may bring up excessive jitter. Therefore, many researches make much effort about how to fast BSS transition. This dissertation proposes a cluster-chain structure, which facilitate dynamically reselect a cluster and transit to the new one to assure that STA can stay in center of the cluster. This dissertation applies the cluster-chain structure to the autonomous WLAN architecture and the centralized WLAN architecture for fast BSS transition.
[1] The 3rd Generation Partnership Project (3GPP), available at http://www.3gpp.org/.
[2] The 3rd Generation Partnership Project 2 (3GPP2), available at http://www.3gpp2.org/.
[3] 3GPP TS 23.060, Technical Specification Group Services and Systems Aspects; General Packet Radio Service (GPRS); Service Description; Stage 2.
[4] 3GPP TS 23.228, Service requirements for the IP multimedia core network subsystem.
[5] 3GPP TS 23.234, 3GPP System to Wireless Local Area Network (WLAN) Interworking; System Description (Release 6).
[6] 3GPP TS 24.228, Technical Specification Group Core Network; Signaling flows for the IP multimedia call control based on SIP and SDP; Stage 3.
[7] 3GPP TS 29.229, Technical Specification Core Network;Cx and Dx Interfaces Based on the Diameter Protocol; Protocol Details.
[8] 3GPP TS 33.203, Technical Specification Group Services and Systems Aspects; 3G Security; Access security for IP-based services (Release 6).
[9] 3GPP TS 33.210, Technical Specification Group Services and System Aspects; 3G Security; Network Domain Security; IP network layer security (Release 7).
[10] 3GPP TS 33.220, Generic Authentication Architecture (GAA); Generic bootstrapping architecture.
[11] 3GPP TS 33.234, 3G Security; Wireless Local Area Network (WLAN) Interworking Security (Release 6).
[12] 3GPP TS23.002 (v5.8.0), Network Architecture, Release 5.
[13] 3GPP TS33.102, 3GPP Security; Security Architecture.
[14] B. Aboba and D. Simon, “PPP EAP TLS Authentication Protocol,” IETF RFC 2716, October 1999.
[15] ANSI/IEEE Std 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999.
[16] J. Arkko and H. Haverinen, “EAP AKA Authentication,” IETF Internet draft, draft-arkko-pppext-eap-aka-12, Apr. 2000.
[17] M. Bellare, D. Pointcheval, and P. Rogaway, “Authenticated key exchange secure against dictionary attacks,” Advances in Cryptology - Eurocrypt 2000 Proceedings, Lecture Notes in Computer Science, vol. 1807, pp. 139–155, 2000.
[18] M. Bellare and P. Rogaway, “Entity authentication and key distribution,” Advances in Cryptology - Crypto 93 Proceedings, Lecture Notes in Computer Science, vol. 773, pp. 232–249, 1994.
[19] F. Bersani, “The EAP-PSK Protocol: a Pre-Shared Key EAP Method,” IETF Internet draft, draft-bersani-eap-psk-06, 2004.
[20] L. Blunk and J. Vollbrecht, “PPP Extensible Authentication Protocol (EAP),” IETF RFC 2284, Mar. 1998.
[21] M. Buddhikot, G. Chandrannmenon, S. Han, Y. W. Lee, S. Miller, and L. Salgarelli, “Integration of 802.11 and Third-Generation Wireless Data Networks,” Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), pp. 503–512, 2003.
[22] P. Calhoun, M. Montemurro, and D. Stanleyf, CAPWAP Protocol Binding for IEEE 802.11. draft-ietf-capwap-protocol-binding-ieee80211-03, IETF, April 2007.
[23] P. Calhoun,M.Montemurro, and D. Stanleyf, CAPWAP Protocol Specification. draft-ietf-capwap-protocol-specification-06, IETF, April 2007.
[24] J. C. Chen and H. W. Lin, “A gateway approach to mobility integration of GPRS and wireless LANs,” IEEE Wireless Communications, vol. 12, no. 2, pp. 86 – 95, April 2005.
[25] I. B. Damgard, “A design principle for hash functions,” Advances in Cryptology-9th Annual International Cryptology Conference (CRYPTO’89), Lecture Notes in Computer Science, vol. 435, pp. 416–427, 1989.
[26] J. Edney and W. A. Arbaugh, Real 802.11 Security: Wi-Fi Protected Access and
802.11i. Addison Wesley, 2003.
[27] P. Eronen, T. Hiller, and G. Zorn, “Diameter Extensible Authentication Protocol(EAP) Application,” IETF Internet draft, draft-ietf-aaa-eap-04.txt, Feb. 2004, work in progress.
[28] V. Feng, L. Y. Wu, Y. B. Lin, and W. E. Chen, “WGSN: WLAN-based GPRS support node with push mechanism,” The Computer Journal, vol. 47, no. 4, pp. 405– 417, July 2004.
[29] J. Franks, P. M. Hallam-Baker, J. L. Hostetler, S. D. Lawrence, and P. J. Leach, HTTP Authentication: Basic and Digest Access Authentication. RFC 2617, IETF, June 1999.
[30] C. M. Huang and J. W. Li, “Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA 2005), vol. 1, pp. 392 – 397, 25-30 March 2005.
[31] C.-M. Huang and J.-W. Li, “Efficient and provably secure ip multimedia subsystem authentication for umts,” The Computer Journal, vol. 50, no. 6, pp. 739–757, 2007.
[32] IEEE Standard 802.1f, IEEE. Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operation, July 2003.
[33] IEEE Std 802.11i, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements, 2004.
[34] IEEE Std 802.11r, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 2: Fast BSS Transition, D6.0, 2007.
[35] IEEE Std 802.1X-2001, Port-Based Network Access Control, June 2001.
[36] T. Iwata and K. Kurosawa, “OMAC: One-Key CBC MAC,” Lecture Notes in Computer Science (Fast Software Encryption Conference; FSE2003), vol. 2887, pp. 129–153, 2003.
[37] M. Kassab, A. Belghith, J.-M. Bonnin, and S. Sassi, “Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks,” Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling, pp. 46–53, 2005.
[38] S. Kent and R. Atkinson, Security Architecture for the Internet Protocol. RFC 2401, IETF, November 1998.
[39] H. Krawczyk, M. Bellare, and R. Canetti, “HMAC: Keyed-Hashing for Message Authentication,” RFC 2104, 1997.
[40] J. F. Kurose and K. W. Ross, Computer Networking: A Top-Down Approach Featuring the Internet, 3rd ed. Addison Wesley, May 2004.
[41] Y.-B. Lin, M.-F. Chang, M.-T. Hsu, and L.-Y. Wu, “One-pass GPRS and IMS authentication procedure for UMTS,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 6, pp. 1233– 1239, June, 2005.
[42] Y.-B. Lin and Y.-K. Chen, “Reducing authentication signaling traffic in third-generation mobile network,” IEEE Transactions on Wireless Communications, vol. 2, no. 3, pp. 493– 501, May 2003.
[43] J. Loughney, M. Nakhjiri, C. Perkins, and R. Koodli, Context Transfer Protocol (CXTP). RFC 4076, IETF, July 2005.
[44] R. C. Merkle, “One-way hash functions and DES,” Proceedings of Advances in Cryptology, CRYPTO’89, pp. 428–446, 1989.
[45] A. Mishra, M. H. Shin, N. L. Petroni, T. C. C. Jr., and W. A. Arbaugh, “Pro-active Key Distribution using Neighbor Graphs,” IEEE Wireless Communications, vol. 11, no. 1, pp. 26–36, 2004.
[46] A. Mishra, M. Shin, and W. A. Arbaugh, “Context Caching using Neighbor Graphs for Fast Handoffs in a Wireless Network,” Proceedings of the IEEE INFOCOM Conference, vol. 1, pp. 351–361, 2004.
[47] M. Naor and O. Reingold, “Number-theoretic constructions of efficient pseudo-random functions,” Journal of the ACM, vol. 51, no. 2, pp. 231–262, 2004.
[48] A. Niemi, J. Arkko, and V. Torvinen, Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA). RFC 3310, IETF, September 2002.
[49] B. O’Hara, P. Calhoun, and J. Kempf, Configuration and Provisioning for Wireless Access Points (CAPWAP) Problem Statement. RFC 3990, IETF, February 2005.
[50] S. Pack, S. Pack, J. Choi, T. Kwon, and Y. Choi, “Fast-handoff Support in IEEE 802.11 Wireless Networks,” IEEE Communications Surveys & Tutorials, vol. 9, no. 1, pp. 2–12, 2007.
[51] S. Pack and Y. Choi, “Fast Handoff Scheme based on Mobility Prediction in Public Wireless LAN Systems,” IEE Proceedings of Communications, vol. 151, no. 5, pp. 489–495, 2004.
[52] S. Pack, H. Jung, T. Kwon, and Y. Choi, “SNC: A Selective Neighbor Caching Scheme for Fast Handoff in IEEE 802.11 Wireless Networks,” ACM SIGMOBILE Mob. Comput. Commun. Rev., vol. 9, no. 4, pp. 39–49, 2005.
[53] I. Ramani and S. Savage, “SyncScan: Practical Fast Handoff for 802.11 Infrastructure Networks,” Proceedings of the IEEE INFOCOM Conference, vol. 1, pp. 675 – 684, 2005.
[54] E. Rescorla and N.Modadugu, Datagram Transport Layer Security. RFC 4347, IETF, April 2006.
[55] R. Rivest, “The MD5 message digest algorithm,” RFC 1321, April 1992.
[56] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler, SIP: Session Initiation Protocol. RFC 3261, IETF,
2002.
[57] B. Sarikaya and R. Jaksa, CAPWAP Handover Protocol (CAPWAPHP). draft-sarikaya-capwap-capwaphp-02, IETF, June 2006.
[58] B. Sarikaya and R. Jaksa, CAPWAP Roaming Protocol in 802.11R Domains. draft-sarikaya-capwap-fastbss-00, IETF, October 2006.
[59] B. Sarikaya and Z. Xiao, “Capwap handover protocol,” Proceedings of IEEE International Conference on Communications (ICC’06), vol. 4, pp. 1933–1938, 2006.
[60] M. Shin, A. Mishra, and W. A. Arbaugh, “An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process,” Computer Communication Review, vol. 33, no. 2, pp. 93–102, 2003.
[61] M. Shin, A. Mishra, and W. A. Arbaugh, “Improving the Latency of 802.11 Hand-offs Using Neighbor Graphs,” Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, pp. 70–83, 2004.
[62] W. Stallings, Cryptography and Network Security: Principles and Practice, 3rd ed. Prentice Hall, 2003.
[63] V. Torvinen, J. Arkko, and M. Naeslund, Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) Version-2. RFC 4169, IETF, November 2005.
[64] Y. M. Tseng, C. C. Yang, and J. H. Su, “Authentication and Billing Protocols for the Integration of WLAN and 3G Networks,” Wireless Personal Communications, vol. 29, no. 3-4, pp. 351–366, 2004.
[65] H. Velayos and G. Karlsson, “Techniques to Reduce the IEEE 802.11b Handoff Time,” Proceedings of IEEE International Conference on Communications (ICC), vol. 7, pp. 3844 – 3848, 2004.
[66] L. Yang, P. Zerfos, and E. Sadot, Architecture Taxonomy for Control and Provisioning of Wireless Access Points (CAPWAP). RFC 4118, IETF, June 2005.
[67] M. Zhang and Y. Fang, “Security analysis and enhancements of 3GPP authentication and key agreement protocol,” IEEE Transactions on Wireless Communications, vol. 4, no. 2, pp. 734–742, March 2005.