The above and other objects, features and advantages of the present invention will be more apparent from the following detailed description taken in conjunction with the accompanying drawings, in which:
Reference will now be made in detail to the preferred embodiment of the present invention, examples of which are illustrated in the drawings attached hereinafter, wherein like reference numerals refer to like elements throughout. The embodiments are described below so as to explain the present invention by referring to the figures.
Messaging Process
(1) A mobile node generates a registration message based on a router advertisement message received from a nAR. The generated registration message includes a message to register with a pAR and a message to register with the nAR.
(2) Since the mobile node is in a ping-pong state, the mobile node cannot determine the exact moving direction of the mobile node itself. Therefore, the mobile node simultaneously transmits the registration messages to the nAR and the pAR.
(3) The pAR does not commit (i.e., does not forward) an authentication request message, which has been received from the mobile node, to a home AAA server (AAAH), and the pAR itself performs authentication. According to the present invention, the pAR preserves information relating to authentication previously performed for the mobile node. Therefore, when an authentication request is again received from the mobile node, the pAR does not request authentication of the mobile node to the AAAH, and directly performs authentication of the mobile node by using the preserved authentication-related information, thereby reducing the time necessary for forwarding an authentication message.
(4) The pAR, having performed the authentication, transmits a response message to the registration message to the mobile node.
(5) The mobile node authenticates the response message received from the pAR. Thereafter, the mobile node can safely communicate with the pAR by means of a session key contained in the response message received from the pAR.
(6) The nAR receives an authentication request message of the mobile node.
(7) Since the nAR has no information about the mobile node, the nAR forwards the authentication request message to an AAAH for the purpose of requesting authentication, unlike the pAR.
(8) The AAAH authenticates the authentication request message of the mobile node, which has been transmitted from the nAR.
(9) In order to notify a home agent (HA) that the mobile node has moved to a new network, the AAAH transmits new Care-of-Address (CoA) information of the mobile node to the home agent.
(10) The home agent records the new CoA information of the mobile node in its own Binding Update List (BUL), thereby determining that a handover has been performed.
(11) The home agent transmits a confirmation message, which represents that the new CoA information of the mobile node has been recorded, to the AAAH.
(12) The AAAH creates a registration confirmation message to be transmitted to the nAR.
(13) The AAAH transmits the created registration confirmation message to the nAR.
(14) As soon as the nAR receives the registration confirmation message from the AAAH, the nAR authenticates the mobile node.
(15) The nAR transmits the registration confirmation message, which has been received from the AAAH, to the mobile node.
(16) Finally, the mobile node receives the registration confirmation message from the nAR. In addition, the mobile node acquires a session key created by the home agent, and thus can safely communicate with the nAR.
Hereinafter, a result of comparison between the conventional authentication method and a dual authentication method according to the present invention will be described.
Table 1 shows the definitions of system parameters necessary for performance estimation of the dual authentication method according to the present invention.
Total Authentication Time
Based on the message transmission process described with reference to
(1) Sum of the processing times (SPT): A processing procedure is required for packets received in steps (1), (3), (5), (6), (8), (10), (12), (14) and (16) described above with reference to
SPT=9Tproc
(2) Sum of the message signature creation/verification times (Sum of the message encryption and decryption time; SME): Signature creation is required in steps (1), (8) and (10) described above with reference to
SME=3SMEcreate+6SMEverify
(3) Sum of the message transmission times in wired links (SMT1): Message transmission in wired links is performed in steps (7), (9), (11) and (13) as described above with reference to
SMT
1=4T1
(4) Sum of the message transmission time in wireless links (SMTw): Message transmission in wireless links is performed in steps (2), (4), and (15) described with reference to
SMT
w=4(2Mw+Tout)
The total processing time required for the dual authentication method proposed in the present invention may be expressed as a sum of values obtained from the four steps. Accordingly, the following Equation is derived.
T
req
=SPT+SME+SMT
1
+SMT
w
Authentication Failure Rate
In order to calculate the authentication failure rate due to a ping-pong state in the dual authentication method according to the present invention, a random variable “T” is defined. The random variable “T” represents a time period during which a mobile node stays in an area, as shown in
The “Treq” calculated above represents a time period required for a mobile node to perform the dual authentication. Therefore, an authentication failure rate is expressed as the following equation.
P=Prob(T<Treq)
In this equation, when it is assumed that the random variable “T” is exponentially distributed, the authentication failure rate may be expressed as follows:
P=Prob(T<Treq)=1−exp(−λTreq)<Pf
Herein, “λ” represents a rate at which a mobile node enters an overlapping coverage area, in which it is assumed that the moving directions of the mobile node are uniformly distributed on the interval [0;2π). Therefore, according to the prior art (“Influence of the moving of the mobile stations on the performance of a radio mobile cellular network” by R. Thomas, H. Gilbert, G. Mazziotto in Proceedings of the 3rd Nordic Seminar, 1988), “λ” is calculated by λ=VL/πS. Herein, “V” represents the velocity of a mobile node, and “L” represents the length of an overlapping coverage area wherein
(herein, “l” represents the radius of a circle which a signal of an access router reaches). Also, the size “S” of an overlapping coverage area is calculated as follows:
Thus, the authentication failure rate of the mobile node may be calculated in terms of “l” (radius of signal coverage) and “V” (velocity of mobile node). The authentication failure rate based on the size of “l” is expressed as follows:
In addition, the authentication failure rate based on a change in “V” may be expressed as follows:
Comparison of Authentication Failure Rate
The dual authentication method according to the present invention may be applied to mobile nodes based on IP such as Wibro. In addition, the dual authentication method according to the present invention may be applied to notebook computers and PDAs, equipped with IEEE 802.11 technology. Multimedia services made available by such mobile nodes may be used as a basic technology for various mobile application services, and is expected to contribute to developing security technology in a non-wireless/wireless integrated network environment in the future.
As described above, according to the present invention, when a mobile node enters a ping-pong state, dual authentication is performed, thereby preventing a failure of authentication in the ping-pong state, solving the buffering problem, and rapidly and safely performing authentication of the mobile node in the AAA environment. In addition, the dual authentication method according to the present invention advances the mobile node technology for the ubiquitous environment in which all terminals (i.e., nodes) are equipped with the IP protocol, thereby being used for various group application services as well as various multimedia services. The dual authentication method according to the present invention is expected to develop the security technology in non-wireless/wireless integrated network environments, and to activate various application services for mobile nodes.
The present invention is expected to contribute to indicating security requirements for authentication a mobile node in a mobile environment, and presenting an authentication technology to be expanded and developed to various application fields. Also, until now, no IT or security provider has developed such a dual authentication method as that of the present invention. Therefore, when the dual authentication method of the present invention is commercialized, the dual authentication method functions as a core security technology, so that it is expected that providers employing the dual authentication method have the foundation of a new security technology recognized in the inside and outside of the country future.
Although a preferred embodiment of the present invention has been described for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2006-0082604 | Aug 2006 | KR | national |