The OBAN project and issues for standardisation. Duration: 3 years 2004/1 – 2006/12 Budget/EC cont: 11/5 M 14 partners coordinated by Telenor 4 telecom.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Authentication.
Multi-Access Services in Heterogeneous Wireless Networks Kameswari Chebrolu, Ramesh R. Rao Abstract Today's wireless world is characterized by heterogeneity.
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Doc.: IEEE xxx Submission May 10-14, 2004 Alan Carlton, Interdigital CommunicationsSlide 1 Defining Layer 2.5 Alan Carlton Interdigital Communications.
Security Policy. TOPICS Objectives WLAN Security Policy General Security Policy Functional Security Policy Conclusion.
Open Access Networks Interworking2002, Perth, Australia October 13-16, 2002 Presented by: Einar Edvardsen, Telenor R & D, Norway Teleph:
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Submission doc.: IEEE 11-13/0343r0 Operator Oriented Wi-Fi — Problem Analysis and Proposals Dapeng Liu Chunju Shao Fang Xie Ge Liu China Mobile.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
URP Usage Scenarios for NAS Yoshihiro Ohba August 2001 Toshiba America Research, Inc.
OBAN Public document OBAN Open Broadband Access Networks IST 6FP Contract No Deliverable D2 Project Presentation.
Company LOGO Interworked WiMAX-3G Cellular Data Networks: An Architecture for Mobility Management and Performance Evaluation 指導教授: 童曉儒 教授 學生:許益晨 IEEE TRANSACTIONS.
1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
SIP and IMS Enabled Residential Gateway Sergio Romero Telefónica I+D Jan Önnegren Ericsson AB Alex De Smedt Thomson Telecom.
Omniran GPP Trusted WLAN Access to EPC Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
Wireless vs. mobile S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WLAN vs. 2G/3G Performance, roaming, mobility, security...
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Cooperation in Wireless Networks Andrea G. Forte Henning Schulzrinne November 14, 2005.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Mobile and Wireless Communication Security By Jason Gratto.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
Doc.: IEEE /229r0 Submission Tan Pek-Yew, Panasonic Slide 1 March 2003 Interworking – QoS and Authorization Tan Pek Yew & Cheng Hong Panasonic.
1. WiMAX_NWG_Stage2 & Stage3. WiMAX Forum The WiMAX Forum is a nonprofit organization formed in 2001 to enhance the compatibility and interoperability.
By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE ) this would be an access.
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
[Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. GPRS/UMTS Security Requirements Guto Motta
A Mobile-IP Based Mobility System for Wireless Metropolitan Area Networks Chung-Kuo Chang; Parallel Processing, ICPP 2005 Workshops. International.
x Evolution Architecture Functional Proposal Abstract: This contribution proposes a new architectural network element called an.
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
OBAN Open Broadband Access Networks H. Almus, TU Berlin, EANTC Research The OBAN project is funded by the European Community’s Sixth Framework Programme,
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Wireless Network Security and Interworking
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland,College Park,MD.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
1 A VPN based approach to secure WLAN access John Floroiu
Doc.: IEEE /0353r0 Submission March 2006 Thomas Haslestad et al, Telenor R&DSlide 1 [A presentation of the OBAN concept An IST Project under EC’s.
Lecture 24 Wireless Network Security
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Wireless security Wi–Fi (802.11) Security
Wireless Unification Theory William Arbaugh University of Maryland College Park.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
Doc.: IEEE /182r0 Submission March 2002 Brüninghaus / Euscher / Kockmann, Siemens.Slide 1 Home Networking Requirements & Aspects for Next Generation.
Trend of Mobility Management Yen-Wen Chen Ref: 1.Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services 2.Transport.
Introduction to “Tap – Dance ”. Company Proprietary Presentation Topics  Introduction  Handover scenarios  Inter-Network Handover consequences  Common.
Integration of and Third-Generation Wireless Data Networks
Proposed SFD Text for ai Link Setup Procedure
2002 IPv6 技術巡迴研討會 IPv6 Mobility
Wireless Communication CDMA EVDO Systems
Wireless LAN Security 4.3 Wireless LAN Security.
March 2006 doc.: IEEE /0353r0 March 2006
Stefan Rommer, Mats Näslund, András Méhes (Ericsson)
Application Layer Mobility Management Scheme for Wireless Internet
Authentication and handoff protocols for wireless mesh networks
Presentation transcript:

The OBAN project and issues for standardisation

Duration: 3 years 2004/1 – 2006/12 Budget/EC cont: 11/5 M 14 partners coordinated by Telenor 4 telecom operators (Telenor, Telefonica, Swisscom, France Telecom) 6 industrial partners (Lucent(NL), Birdstep(N), ObexCode(N), Motorola(I), EuroConcepts(I), Lucent(UK) 3 universities/institutes Sintef(N), Techn. Univ. Berlin(D), ISMB(I) 1 national telecom regulator NPT(N)

Abstract This presentation introduces the concept of OBAN (Open Broadband Access Network), an European funded project under the IST 6th framework program. The presentation focus on the mobility architecture and the challenges introduced: –Scalable and flexible mobility management in a cross Access Service provider /Internet Service Provider scenario –Handover for delay constrained services such as voice, video etc.

Rational behind Wireless LANs have large capacity and are often poorly exploited OBAN intends to investigate how the public can obtain access to these resources and what kind of services can be provided over this network.

The concept contains numerous challenges Mobility aspects – nomadic or continuous mobility Security and authentication Roaming agreements –Between different network operators –Between owners of Residential Gateways (RG) How to match QoS in the legacy network with what can be achieved in a wireless LAN and while traversing from RG to RG ? How to deal with the large variety of terminals? Interference between RGs and with other equipment – frequency planning Business models and commercial aspects

The Security & Mobility Challenge (1) The security level expected for OBAN architecture has to coexist with strong time and QoS constraints A goal of 120 ms maximum handover latency implies that a full authentication that involves several actors and ditto round-trip times is not acceptable. Fast handover requires an authentication mechanism that only involves the terminal and the RGW. Security in relation to fast re-authentication during handoff: –Two potential solutions: –delayed authentication, –fast hand-over using Kerberos Tickets

The Security & Mobility Challenge (2) No preprocessing of keys and session parameters by network to prepare handover in advance. –2G and 3G does this by default An STA in IEEE can only be associated with one AP at a time. The mobile station must after sensing a beacon, negotiate with next AP that again must performs a full RADIUS roundtrip with ISP to handle AAA and security session –In practice: a re-authentication (roaming) based on e.g. EAP will include a full time consuming RADIUS roundtrip involving STA, AP, and ISP(s). In addition; rerouting of traffic as well as 802.1X functions for port control and crypto session establishment on radio link.

Handover task - time considerations T 1 T 2 T 3 T 4 T 5 Handover Starts here Session continues here Session OrientedSecurity Oriented < 100 ms >> 150 ms (!) Interruption delay T1: Beacon + Physical connection setup between the STA and the next AP/RGW T2: Messaging session parameters, including STAs ID / auth. info between the VU and the next AP/RGW. T3: Processing of rerouting the traffic to and from STA via the new AP. T4: AAA roundtrip for re-authentication of the STA between AP/RGW and H-ISP of the STA T5: 802.1X port handling and TKIP/AES-based encryption of radio link between VU and AP

The high level architecture VU RGW 1 Mobility Broker (MB) CARD Server RGW 2 MIP VU CARD Client FA CARD Proxy FA CARD Proxy MIP CARD Client HA (of VU) ISP of VU Internet MB:Mobility Broker RG:Residential Gateway MIP: Mobile IP VU:Visiting User HA:Home Agent FA: Foreign Agent GFA:Gateway FA GFA AAA SIP proxy/ registrar HA AAA OBAN service provider

Mobility Broker A node serving a geographical area, composed of several RGWs Makes the access network look like a conventional WLAN/IP network, such that standard mechanisms can be reused Simplify the hand-off complexity, and reduce signaling round trips by managing mobility, security and QoS events locally during hand- off

Fast Handover using Kerberos tickets Using Kerberos tickets for fast and secure layer 2 authentication The ticket consist primarily of an access key and an encrypted timestamp with a key known to the issuer and the final recipient –Issuer = Mobility Broker –Final recipient = RGW The ticket is issued to the client (user terminal) and encrypted with a key that is in the possession of the client. (shared secret) –The client uses the ticket for authentication towards the RGW –Proves that is possesses the session key within the ticket, b y encrypting a challenge from the RGW with the session key –RGW also checks that the timestamp is not expired

Fast Handover using Kerberos tickets First time authentication –No tickets => full authentication towards HAAA. i.e. Anything that generates a session key (e.g. EAP – SIM) –The final EAP SUCCESS is not proxied to the terminal but exchanged in the Mobility broker with a Ticket-granting Ticket –The terminal requests MB for a suitable set of tickets. –EAP SUCCESS is then finally delivered –The MB is geographically aware. Successive re-auth –Only between terminal and RGW

Fast Handover using Kerberos tickets Delay estimation –Network Authentication + MIP registration = total delay –Full auth: + = –Re-auth in same domain: + = –Re-auth in diff domain: + = Standard compliance –the full authentication does not comply with the EAP requirement regarding sequence of methods.

Delayed Authentication (1) (Patent Pending) Open 802.1x for user traffic as fast as possible, and before security functions/authentication are completed. Full AAA roundtrip to be executed while ongoing user traffic from STA. T 1 T 2 T 3 T 4 T 5 Handover startshere discontinued session (< 100ms) Session continues here Full Security established Continued, but insecure session (a few seconds), Securedand accounted traffic < 100 ms

Delayed Authentication (2) New / Increased Security risks: –Unaccounted user traffic for a few seconds –No encryption on the radio link –Potential DoS attacks (in addition to those already existing ) Countermeasures: –Introduce a timer to limit the maximum pending time for a RADIUS response (success or reject) –Possible for AP to cache and block MAC addresses with repeated failing attempts –Policy selector: Monitor accounted vs unaccounted traffic and allow to toggle back to standard state machine (ie. standard policy) if unaccounted level is bad. (toggle back after a configurable time)

Consequences Introducing a new state: Pending_Authenticated in the IEEE 802.1X State Model Must allow for class 3 traffic (both STA and AP) Extra robustness functions to minimize the new risks (timer, MAC cache etc) Compensation functions also to account for conveyed STA traffic before successful RADIUS response. (STA traffic conveyed before a RADIUS reject (or timer elapse etc) cannot be accounted for). Authenticated & Associated Authenticated UnAssociated UnAuthenticated UnAssociated Pending_Authenticated Associated Class 1, 2 & 3 frames allowed Successful Authentication DeAuthentication Notification Class 1, 2 & 3 frames allowed Class 1& 2 frames allowed Class 1 frames allowed

Possible gain Applications with strict real-time requirements can be handled more comfortably also in the mobile case increased popularity & New Business opportunities Seamless functionality also delivered with high-speed broadband –2G/EDGE: max ~200 Kbit/s, –3G/UMTS ~400 Kbit/s, –802.11(): 1Mbit/s ++ Enabling true roaming for based access networks