The present invention generally relates to authentication between mobile terminals and base stations in wireless communication systems.
The WiMAX Forum defines specifications for network support of the IEEE 802.16e based radio interface. As of the date of filing this application, the current releases of these specifications are described in the Stage 2 [WMF-T32-005-R010v04_Network-Stage2] and Stage 3 [WMF-T33-004-R010v04_Network-Stage3] documents published by the WiMAX Forum.
To provide communications security in a WiMAX wireless system, a security association is maintained between the mobile terminal and the serving network. This security association is created with the assistance of the subscriber's home network during initial subscription authentication of the user terminal entering the network, and subsequently can be refreshed during re-authentication events. Optimal allocation of system resources during such re-authentication events constitutes an on-going issue.
A method is provided for Authenticator Relocation in a communication system that typically applies an Extensible Authentication Protocol, or the like, which provides replay protection and mitigates the rogue ASN-GW problem during relocation of the Anchor Authentication, and without conducting re-authentication of the MS. In one embodiment of the invention an application of a counter value is provided as a token in messages exchanged among elements of the authentication protocol for relocation of the authenticator. In another embodiment of the invention, an application is provided for a secure refresh of the Master Session Key without conducting re-authentication.
The teachings of the present invention can be readily understood by considering the following detailed description in conjunction with the accompanying drawings, in which:
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular architectures, interfaces, techniques, etc., in order to provide a thorough understanding of illustrative embodiments of the invention. However, it will be apparent to those skilled in the art that the invention may be practiced in other illustrative embodiments that depart from these specific details. In some instances, detailed descriptions of well-known devices, circuits, and methods are omitted so as not to obscure the description of described embodiments with unnecessary detail. All principles, aspects, and embodiments, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future.
The invention is described hereafter in terms of a WiMAX application. It should be clear, however, that the invention will be applicable to in other wireless systems, and that the use the WiMAX application in the description following is solely for purposes of illustrating the invention principles, and is not in any way intended to limit the scope of the invention.
In wireless communication systems, a security mechanism is generally applied to assure that only authorized users are provided access to the communication system. The protocol carried out to implement such security mechanisms is generally characterized as authentication, and commonly is divided among three entities:
In many wireless communication systems, including WiMAX, authentication is implemented using Extensible Authentication Protocol (EAP). As described in the WiMAX security framework, Sec.7.3, and in particular, Sec.7.3.8, with successful completion of the EAP-based authentication protocol, both the mobile station (MS) and the Home AAA (HAAA) server generate the secret Master Session Key (MSK). This key is sent by the HAAA to the Authenticator function in the Serving System ASN-GW.
This MSK security association is further used to create multiple lower level security keys for information encryption, integrity protection, etc.
The Authenticator function in the ASN-GW is anchored and may remain static for a substantial period of time, while the MS is served by Base Stations (BS) within the realm of the Serving ASN. The Authenticator may also remain anchored if the MS roams into a neighboring ASN, as long as that ASN belongs in a fully trusted domain of the same operator. However, as the MS hands over to another ASN crossing the trust boundary, over the R4 interface reference point (as shown in
As a result of re-authentication, the new ASN-GW assumes Authenticator responsibilities, and receives the new MSK. In effect, such re-authentication causes relocation of the Authenticator.
In a dynamic high mobility environment, rapid movements of the MS will cause frequent handovers between neighboring ASNs, and thus will require frequent relocations of the Authenticator function from one ASN-GW to another. Conducting such repeated re-authentications imposes additional burden on the backhaul network, AAA infrastructure, and, more importantly, on the Air Interface.
For example, consider an MS that roams from one ASN to another while in the Idle mode, i.e., not actively communicating with the serving system. In order to conduct the re-authentication for Authenticator relocation, the system would need to “wake up” the MS, execute a complex EAP authentication protocol, and then release the MS back into Idle. This operation will strain the MS and system resources.
A method has been provided in the art for Authenticator shifting without conducting re-authentication. The essence of that approach is shown on
The above-described prior-art procedure suffers from several deficiencies as described below:
The inventor discloses herein several modifications to the prior art methodology that address the problems identified in that approach. These modifications are shown in
Specifically,
As noted above, two illustrative embodiments of the invention are depicted by
In summary, the modified Authenticator Relocation procedure of the invention methodology, as described herein, provides replay protection and mitigates the rogue ASN-GW problem during relocation of the Anchor Authentication, and without conducting re-authentication of the MS, while optionally allowing secure refresh of the MSK.
Herein, the inventors have disclosed a method for supporting mobility of a roaming mobile terminal from one serving system to another, with relocation of the Authenticator function, but without the need for Re-authenticating the mobile terminal, that provides significant improvements in network security over methods of the art. Numerous modifications and alternative embodiments of the invention will be apparent to those skilled in the art in view of the foregoing description.
Accordingly, this description is to be construed as illustrative only and is for the purpose of teaching those skilled in the art the best mode of carrying out the invention and is not intended to illustrate all possible forms thereof. It is also understood that the words used are words of description, rather that limitation, and that details of the structure may be varied substantially without departing from the spirit of the invention, and that the exclusive use of all modifications which come within the scope of the appended claims is reserved
This application claims priority pursuant to 35 U.S.C. Sec 119(e) to U.S. Provisional Application No. 61/280,168, filed Oct. 30, 2009, entitled “AUTHENTICATOR RELOCATION METHOD FOR WIMAX SYSTEM,” the subject matter thereof being fully incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
7624433 | Clark et al. | Nov 2009 | B1 |
7752441 | Mizikovsky et al. | Jul 2010 | B2 |
7987366 | Blom et al. | Jul 2011 | B2 |
20030108199 | Pinder et al. | Jun 2003 | A1 |
20040052377 | Mattox et al. | Mar 2004 | A1 |
20050154889 | Ashley et al. | Jul 2005 | A1 |
20070016780 | Lee et al. | Jan 2007 | A1 |
20070150744 | Cheng et al. | Jun 2007 | A1 |
20070154016 | Nakhjiri et al. | Jul 2007 | A1 |
20070192605 | Mizikovsky et al. | Aug 2007 | A1 |
20070201697 | Altshuller et al. | Aug 2007 | A1 |
20080089294 | Shon et al. | Apr 2008 | A1 |
20080137853 | Mizikovsky et al. | Jun 2008 | A1 |
20080178274 | Nakhjiri et al. | Jul 2008 | A1 |
20080227458 | Wu | Sep 2008 | A1 |
20080253569 | Lim et al. | Oct 2008 | A1 |
20090019284 | Cho et al. | Jan 2009 | A1 |
20090110196 | Tsai et al. | Apr 2009 | A1 |
20090193511 | Noe et al. | Jul 2009 | A1 |
20090274302 | Wu et al. | Nov 2009 | A1 |
20090280774 | Patel et al. | Nov 2009 | A1 |
20090282243 | Rose et al. | Nov 2009 | A1 |
20090282253 | Rose et al. | Nov 2009 | A1 |
20090307496 | Hahn et al. | Dec 2009 | A1 |
20100046467 | Chiou et al. | Feb 2010 | A1 |
20100167747 | Karnam et al. | Jul 2010 | A1 |
20100180111 | Hahn et al. | Jul 2010 | A1 |
20100184407 | Tachikawa | Jul 2010 | A1 |
20100205442 | Han et al. | Aug 2010 | A1 |
20100205448 | Tarhan et al. | Aug 2010 | A1 |
20100232606 | Lee et al. | Sep 2010 | A1 |
20100235900 | Robinton et al. | Sep 2010 | A1 |
20100325714 | Iyer et al. | Dec 2010 | A1 |
20110004754 | Walker et al. | Jan 2011 | A1 |
20110041003 | Pattar et al. | Feb 2011 | A1 |
20110047382 | Wang et al. | Feb 2011 | A1 |
20110063997 | Gras et al. | Mar 2011 | A1 |
20110076987 | Lee et al. | Mar 2011 | A1 |
20110149926 | Li et al. | Jun 2011 | A1 |
20110238834 | Nair et al. | Sep 2011 | A1 |
20110302646 | Ronda et al. | Dec 2011 | A1 |
20110307949 | Ronda et al. | Dec 2011 | A1 |
20120066757 | Vysogorets et al. | Mar 2012 | A1 |
Number | Date | Country |
---|---|---|
1 954 083 | Aug 2008 | EP |
Entry |
---|
Kim, Youngwook et al, “Enhancing Security Using The Discarded Security Information in Mobile WiMAX Networks”, Global Telecommunications Conference, 2008. IEEE Globecom 2008, Piscataway, NJ USA, Nov. 30, 2008, XP031370077, pp. 1-5. |
International Search Report dated May 25, 2011 (PCT/US2010/054426) 5 sheets. |
Number | Date | Country | |
---|---|---|---|
20110107085 A1 | May 2011 | US |
Number | Date | Country | |
---|---|---|---|
61280168 | Oct 2009 | US |