1. Field of the Invention
The invention relates to data processing for a wireless network, and more particularly to a key management system and method for wireless networks.
2. Description of the Related Art
Additionally, the NSP acts as the main service provider, composed of one or more connectivity service network (CSN). Since authentication is provided by the NSP, the AAA server usually resides in the CSN. Based on such structure, the ASN can be an AAA proxy server or an AAA authenticator. Generally, the ASN usually acts as a message forwarder for communication and each ASN comprises one or more base stations (BS). Each base station provides large wireless access scope and communication mechanisms.
The WiMAX network system applies extensible authentication protocol (EAP) during authentication, wherein the EAP comprises EAP-Transport Level Security (EAP-TLS), EAP-Authentication and Key Agreement Protocol (EAP-AKA), EAP-Subscriber Identity Module (EAP-SIM), . . . and so on. The EAP-TLS utilizes the public key infrastructure (PKI), which provides high security. The WiMAX standard supports mobility, defining micro handoff and macro handoff. The “micro handoff” indicates that a mobile station has wandered from an emitting range of a base station to that of another base station, whereby both the base stations reside in the same ASN. The “macro handoff” indicates that a mobile station has wandered from an ASN to another ASN, whereby the mobile station is authenticated since gateways of both the ASNs reside in the same CSN range.
When the “macro handoff” is implemented, a mobile station must be authenticated using the EAP mechanism, which is safer but more complicated for authentication switch operations. Thus, if there is no optimization mechanism when switch operations are required, the authentication process is time-consuming and connections may be interrupted when seamless handoff for the mobile station is performed.
Thus, the invention provides a key management system and method for wireless networks, providing a safe and fast re-connection protocol.
Key management methods for wireless networks are provided. An exemplary embodiment of a key management method for wireless networks comprises the following.
Before a mobile station, residing in a first access service network (ASN), switches to a neighboring second ASN, an authentication process between the mobile station and the second ASN is pre-implemented, such that the authentication process is not required when the mobile station is switching to the second ASN.
Key management systems for wireless networks are provided. An exemplary embodiment of a key management system for wireless networks comprises a mobile station, a first ASN comprising the mobile station, and a second ASN. Before the mobile station residing in the first ASN switches to a neighboring second ASN, an authentication process between the mobile station and the second ASN is pre-implemented, such that the authentication process is not required when the mobile station is switching to the second ASN.
A detailed description is given in the following embodiments with reference to the accompanying drawings.
The invention can be more fully understood by reading the subsequent detailed description and examples with references made to the accompanying drawings, wherein:
Several exemplary embodiments of the invention are described with reference to
The invention discloses a key management system and method for wireless networks.
An embodiment of a key management system and method for wireless networks pre-calculates pairwise master keys (generating keying material parameters for the pairwise master keys) for subsequent switched ASNs before actual switching occurs. The keying material parameter is, but is not limited to, a pseudo-random number. Thus, when the mobile station switches to one of the ASNs, required pairwise master keys can be calculated fast according to the pre-calculated keying material parameters and public and private keys for subsequent switches can be accordingly calculated.
A mobile station resides in the scope of ASN1 mutually implementing authentication to the AAA server therebetween using the EAP-TLS protocol and Remote Authentication Dial-in User Service (RADIUS) (step S201). In this step, ASN1 and the AAA server are accountable to the mobile station. ASN1 transmits a neighboring ASN list (NL) (ASNj, j=2˜n) and certificates of each ASN to the mobile station (step S202). The neighboring ASN list comprises an identity (ID) of each ASN and a certificate of each ASN comprises the public key thereof. Each ASN ID of the ASN list mutually corresponds to the ASN certificates of the NCL, represented by (ASN1, PUK_ASN1), (ASN2, PUK_ASN2), (ASNn, PUK_ASNn). In this embodiment, suppose the number of ASNs neighboring to ASN1 is less than 10, than the data amount to be received by the mobile station would be acceptable. Certificates of each ASN is issued by a root certificate authority (CA) and the mobile station can verify the certificate of the i-th ASN (PUK_ASNi) using certificates of the root certificate authority.
The mobile station generates a keying material parameter Xi required for the next switch operation (step S203). Since the mobile station only connects to ASN1, the keying material parameter Xi must be relayed to ASN2, ASN3, . . . , ASNi via ASN1. Before the keying material parameter Xi is relayed to ASNj, the mobile station adds a digital signature thereof to the keying material parameter Xi using a private key thereof (PRI_MS, j=2) (step S204), encrypts the keying material parameter Xi using a public key of ASN2 (PUK_ASN2), and adds the ID of ASN2 to the keying material parameter Xi (step S205). The encrypted keying material parameter Xi can be represented as ENCPUK_ASN2(SIGPRI_MS(Xi))∥MS-ID∥ASN2-ID, which is only an example and is not to be limitative.
ASN1 transmits the keying material parameter Xi encrypted by the mobile station to ASN2 based on the ID of ASN2 (step S206). When the keying material parameter Xi is received, ASN2 decrypts the keying material parameter Xi using a private key thereof and authenticates the digital signature therein (step S207). If the authentication is correct, the keying material parameter Xi is not altered during the relay and is generated by the mobile station. ASN2 generates a keying material parameter Y2 required for the switch operation performed by the mobile station (step S208), adds a digital signature thereof to the keying material parameter Y2 using a private key thereof (RPI_ASN2) (step S209), and encrypts the keying material parameter Y2 using a public key (PUK_MS) of the mobile station (step S210). The encrypted second keying material parameter Y2 is represented by ENCPUK_MS(SIGPRI_ASN2(Y2))∥MS-ID∥ASN2-ID.
ASN2 relays the encrypted keying material parameter Y2 to the mobile station via ASN1 (step S211). ANS1 can relay one or more received keying material parameters to the mobile station. When the keying material parameter Y2 is received via ASN1, the mobile station decrypts the keying material parameter Y2 using the private key thereof and authenticates the digital signature therein (step S212). When the authentication between the mobile station and ASN2 (j=2) is complete, it is determined whether j>n (step S213), and, if so, steps S204˜S212 are repeated until j>n.
When the authentications between the mobile station and all the ASNs are complete, the mobile station retrieves a self-generated keying material parameter Xi and a keying material parameter Yj, j=2˜n from ASNj, j=2˜n and each ASN retrieves the self-generated keying material parameter Yj and the keying material parameter Xi from the mobile station (step S214). When the mobile station switches to ASNj, the mobile station and ASNj calculates PMKXi and PMKYj according to the keying material parameters Xi and Yj while using a hash function (step S215). If PMKXi equals to PMKYj, an authentication key (AK) corresponding to 802.16 standards can be calculated. ASNj relays the authentication key to a running base station, such that the mobile station can switch to ASNj.
It is noted that pairwise master keys can be pre-calculated or calculated when a switch operation is preformed. Additionally, pairwise master keys can be calculated using a hash function, represented by PMKi(PMKi=H(Xi∥Yj)).
An embodiment of a key management system for wireless networks at least comprises a mobile station (MS) 100, a first ASN (ASN1), a second ASN (ASN2), an AAA server 400, and a base station (BS) 500. The base station 100 resides in the first ASN 200.
The mobile station 100 mutually implements authentication to the AAA server 400 therebetween using the EAP-TLS protocol and Remote Authentication Dial-in User Service (RADIUS), as represented by operation (1). The first ASN 200 transmits a neighboring ASN list (NL) and certificates of each ASN to the mobile station 100, as represented by the operation (2). The mobile station 100 generates a keying material parameter Xi required for the next switch operation, as represented by the operation (3). Before the keying material parameter Xi is relayed to the second ASN 300, the mobile station 100 adds a digital signature thereof to the keying material parameter Xi using a private key thereof (PRI_MS) (as represented by the operation (4)), encrypts the keying material parameter Xi using a public key of the second ASN 300 (PUK_ASN2), and adds the ID of the second ASN 300 to the keying material parameter Xi, as represented by the operation (5). The first ASN 200 transmits the keying material parameter Xi encrypted by the mobile station 100 to the second ASN 200 based on the ID of the second ASN 200, as represented by the operation (6).
When the keying material parameter Xi is received, the second ASN 300 decrypts the keying material parameter Xi using a private key thereof and authenticates the digital signature therein, as represented by the operation (7). The second ASN 300 generates a keying material parameter Y2 required for the switch operation performed by the mobile station 100 (as represented by the operation (8)), adds a digital signature thereof to the keying material parameter Y2 using a private key thereof (RPI_ASN2) (as represented by the operation (9)), and encrypts the keying material parameter Y2 using a public key (PUK_MS) of the mobile station 100 (as represented by the operation (10)). The second ASN 300 relays the encrypted keying material parameter Y2 to the mobile station 100 via the first ASN 200, as represented by the operation (11). When the keying material parameter Y2 is received via the first ASN 200, the mobile station 100 decrypts the keying material parameter Y2 using the private key thereof and authenticates the digital signature therein, as represented by the operation (12).
If other ASNs (ASN3˜ASNn) are provided, the operations (4)˜(12) are repeated until j>n. When the authentication between the mobile station 100 and the second ASN 300 is complete, the mobile station 100 retrieves the self-generated keying material parameter Xi and the keying material parameter Y2 from the second ASN 300 and the second ASN 300 retrieves the self-generated keying material parameter Yj and the keying material parameter Xi from the mobile station 100, as represented by the operations (12)˜(15). When the mobile station 100 switches to the second ASN 300, the mobile station 100 and the second ASN 300 calculates PMKXi and PMKYj according to the keying material parameter Xi and Yj using a hash function, as represented by the operations (16) and (17). If PMKXi equals to PMKYj, an authentication key (AK) corresponding to the 802.16 standards can be calculated. The second ASN 300 relays the authentication key to the running base station 500, such that the mobile station 100 can switch to the second ASN 300.
An embodiment of a key management method and system for wireless networks is more efficient than conventional methods. The embodiment also provides safe authentication and key exchange, which are implemented so that partial authentication operations required after switching of an original EAP process between a mobile station and an ASN, comprising switch authentication operations between a server and a client and related challenges/responses, are omitted, which saves much time and calculation resources.
Methods and systems of the present disclosure, or certain aspects or portions of embodiments thereof, may take the form of a program code (i.e., instructions) embodied in media, such as floppy diskettes, CD-ROMS, hard drives, firmware, or any other machine-readable storage medium, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing embodiments of the disclosure. The methods and apparatus of the present disclosure may also be embodied in the form of a program code transmitted over some transmission medium, such as electrical wiring or cabling, through fiber optics, or via any other form of transmission, wherein, when the program code is received and loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing and embodiment of the disclosure. When implemented on a general-purpose processor, the program code combines with the processor to provide a unique apparatus that operates analogously to specific logic circuits.
While the invention has been described by way of example and in terms of the preferred embodiments, it is to be understood that the invention is not limited to the disclosed embodiments. To the contrary, it is intended to cover various modifications and similar arrangements (as would be apparent to those skilled in the art). Therefore, the scope of the appended claims should be accorded the broadest interpretation so as to encompass all such modifications and similar arrangements.
Number | Date | Country | Kind |
---|---|---|---|
96140574 | Oct 2007 | TW | national |