IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-07-0297-00-0000 Title: Fast re-Authentication Protocol for Inter-Domain Authentication Date Submitted: September, 11, 2007 Presented at IEEE 802.21 session #NN in City Authors or Source(s): Maryna Komarova (ENST) Abstract: This document provides an overview of the Fast re-Authentication Protocol for inter-AAA domain roaming. 21-07-0297-00-0000
IEEE 802.21 presentation release statements This document has been prepared to assist the IEEE 802.21 Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.21. The contributor is familiar with IEEE patent policy, as stated in Section 6 of the IEEE-SA Standards Board bylaws <http://standards.ieee.org/guides/bylaws/sect6-7.html#6> and in Understanding Patent Issues During IEEE Standards Development http://standards.ieee.org/board/pat/faq.pdf> IEEE 802.21 presentation release statements This document has been prepared to assist the IEEE 802.21 Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.21. The contributor is familiar with IEEE patent policy, as outlined in Section 6.3 of the IEEE-SA Standards Board Operations Manual <http://standards.ieee.org/guides/opman/sect6.html#6.3> and in Understanding Patent Issues During IEEE Standards Development http://standards.ieee.org/board/pat/guide.html> 21-07-0297-00-0000
Outline Problem statement Fast re-Authentication Authentication latency estimation Ticket acquisition Conclusions 21-07-0297-00-0000
Problem statement Motivation: Mobility - ubiquitous and seamless Mutual authentication between the network and the user; Commonly used authentication protocols were designed without taking mobility into consideration; Real-time applications (VoIP) - handover duration must not be more than 150 ms (ITU TG.102); Only the authentication phase of the inter-domain handover takes more time (eg., TLS – 300ms); Inter-domain communication for credentials verification causes unpredictable latencies, Using of certificates is costly and requires complex maintenance; Aim: Decrease the inter-domain authentication latency; Avoid inter-domain communications during handover; Define the credentials for inter-domain roaming; 21-07-0297-00-0000
Proposed approach The network serves the client if the client has been successfully authenticated in a partner network; Proof – the authentication ticket; Both the home and the current networks can generate tickets for clients; Consists of two sub-protocols: ticket acquisition and fast authentication. 21-07-0297-00-0000
Assumptions The mobile user can roam from one non-partner network to another; The user terminal is attached to a network and it has performed an initial full authentication; The target network has roaming agreements either with the user’s home or his current network; Authorities that have roaming agreements share symmetric or asymmetric keys K= {KR} ; The user can communicate with the network, where he has been authenticated, in a secure manner; 21-07-0297-00-0000
Authentication ticket C: part in-clear target_name issuer_name expires S: encrypted part {auth_res user_pseudonym } KR Signature SHA-256(C|S, KR) Issued after successful authentication; May be issued by the home or by the current network; May be verified only by the issuer and the target network ; The ticket is bound to the issuing and the target networks by the usage of the key KR ; to the user by its pseudonym and the result of the previous authentication; Ticket size is 286 bytes; Does not require revocation mechanism; 21-07-0297-00-0000
Fast re-Authentication Based on symmetric cryptography; Ka is the authentication key, derived from the data contained in the ticket, the random number and the address of the UT’s network interface; Km is the Master Secret, serves as a material to session keys derivation. C: part in-clear target_name issuer_name expires S: encrypted part {auth_res user_pseudonym } KR Signature SHA-256(C|S, KR) 21-07-0297-00-0000
Authentication latency Experiments on the described test-bed have shown the average authentication latency 30.59 ms for FAP and 85.33 ms for TTLS-MD5 under the same conditions 21-07-0297-00-0000
Ticket acquisition Provides a client with credentials for further authentication; The home FAPS generates tickets for all partners (one ticket for each partner); The current FAPS generates tickets for its neighboring partners; Signed and encrypted with client’s key 21-07-0297-00-0000
Ticket acquisition Two operation modes: proactive and reactive; A home network creates a neighbor table containing information about the presence of a physical path between its roaming partners; On the client’s request, the server generates tickets only for the networks neighboring to the current location of the user; The approach is based on the creation and the use of the neighbor table. 21-07-0297-00-0000
Optimized ticket distribution Ticket for N3 N1 N1: N2, N3, N4 N2: N1 N3: N2, N5, N1 N4: N1 Request N3 Ticket for N1 N3 Request N2 N3 N4 N5 Reactive mode The UT chooses the target network; The anchor FAPS responds with a ticket and adds the new entity to the neighbor table; Proactive mode The UT is attached to a visited network and it has not chosen the target network; The anchor FAPS creates tickets for all neighbors of the UT’s current network of attachment. 21-07-0297-00-0000
Thank you! Conclusions FAP localizes the authentication process; Eliminates the need for management of user credentials; Minimizes communication between different domains In-session inter-domain communication is steel needed for management and ticket acquisition reasons; Decreases the authentication latency; Allows mutual generation of key material; Easy to implement as the EAP method. Reduces network load at the ticket acquisition phase and makes it possible to serve a greater number of highly mobile users Thank you! 21-07-0297-00-0000