Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
xxx-00-0sec IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx-00-0sec-3gpp-security-non802handover Title: A Study on Security Solutions in.
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
PEAP & EAP-TTLS 1.EAP-TLS Drawbacks 2.PEAP 3.EAP-TTLS 4.EAP-TTLS – Full Example 5.Security Issues 6.PEAP vs. EAP-TTLS 7.Other EAP methods 8.Summary.
EAP AKA Jari Arkko, Ericsson Henry Haverinen, Nokia.
Introduction to Unlicensed Mobile Access. Contents Basic Concept Operation Overview Major Advantages.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Su Youn Lee, Su Mi Lee and Dong Hoon Lee Current Trends in Theory and Practice of Computer Science Baekseok College of Cultural Studies GSIS.
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Pre-Shared Key TLS with GBA support Thesis presentation ESPOO, Finland.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
UNIVERSAL MOBILE TELECOMMUNICATION SYSTEM(UMTS). EVOLUATION OF MOBILE COMMUNICATION 1 st Generation : Analog Cellular 2 nd Generation : Multiple Digital.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
One-Pass GPRS and IMS Authentication Procedure for UMTS
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Federated Authentication mechanism for mobile services Dasun Weerasinghe, Saritha Arunkumar, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group.
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
SMUCSE 5349/7349 GSM Security. SMUCSE 5349/7349 GSM Security Provisions Anonymity Authentication Signaling protection User data protection.
1 © NOKIA MitM.PPT (v0.2) / 6-Nov-02 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI.
All IP Network Architecture 2001 년 12 월 5 일 통신공학연구실 석사 4 차 유성균
Ubiquitous Access Control Workshop 1 7/17/06 Access Control and Authentication for Converged Networks Z. Judy Fu John Strassner Motorola Labs {judy.fu,
NCHU AI LAB Implications of Unlicensed Mobile Access for GSM security From : Proceeding of the First International Conference on Security and Privacy for.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Information Security for Managers (Master MIS)
Wireless and Security CSCI 5857: Encoding and Encryption.
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
Doc.: IEEE /229r0 Submission Tan Pek-Yew, Panasonic Slide 1 March 2003 Interworking – QoS and Authorization Tan Pek Yew & Cheng Hong Panasonic.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Security in GSM/GPRS and UMTS
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING Fifth International Symposium July, 2006, Patras, Greece Security in Wireless Networks:
2 VoIP Mobility & Security Scott Poretsky Director of Quality Assurance Reef Point Systems Securing Fixed-Mobile and Wireless VoIP Convergence Services.
11/26 Integration of wireless LAN and 3G wireless - Interworking architecture between 3GPP and WLAN systems Ahmavaara, K.; Haverinen, H.; Pichna, R.; Communications.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Interoperability Standards
Cellular Access Control and Charging for Mobile Operator Wireless Local Area Networks H. Haverinen, J. Mikkonen and T. Takamaki, Nokia Wei-Jen, Lin Advanced.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Wireless Network Security and Interworking
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
後卓越計畫 進度報告 楊舜仁老師實驗室 GPP-WLAN Interworking (collaboration with ICL/ITRI)
4.1 Security in GSM Security services – access control/authentication user  SIM (Subscriber Identity Module): secret PIN (personal identification number)
All Rights Reserved © Alcatel-Lucent 2007, ##### 1 | Presentation Title | January 2007 UMB Security Evolution Proposal Abstract: This contribution proposes.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Detailed analysis on MIA/MSA architecture Date Submitted: January 5, 2010 Present.
輔大資工所 在職研一 報告人:林煥銘 學號: Public Access Mobility LAN: Extending The Wireless Internet into The LAN Environment Jun Li, Stephen B. Weinstein, Junbiao.
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
GSM Network Architecture
Lecture 24 Wireless Network Security
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
3GPP GBA Overview Adrian Escott.
Wireless Unification Theory William Arbaugh University of Maryland College Park.
Wireless Network Security CSIS 5857: Encoding and Encryption.
N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center
November 2001 Lars Falk, TeliaSlide 1 doc.: IEEE /617r1 Submission Status of 3G Interworking Lars Falk, Telia.
Unlicensed Mobile Access (UMA ) Introduction and Overview Andrew Santarelli David Schraitle Matt Eberts Miguel Ibarra Mohammed Shareef.
1 Rogue Mobile Shell Problem Verizon Wireless October 26, 2000 Christopher Carroll.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Wireless Network PMIT- By-
Unlicensed Mobile Access (UMA )
IEEE MEDIA INDEPENDENT HANDOVER
Security Activities in IETF in support of Mobile IP
LM 7. Cellular Network Security
Presentation transcript:

Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London

Agenda What is UMA UMA Architecture Security in UMA Authentication Encryption EAP-AKA Authentication Future Work

What is UMA UMA allows to access the mobile voice and data services of the cellular network over a Wireless LAN Subscribers are enabled to roam and handover between cellular networks and wireless networks UMA Technology specification was published in September GPP approved the specification as “Generic Access to A/Gb interfaces” Pilot project by Nokia in Finland

What is UMA ( Contd..)

UMA Architecture Mobile devices access the Core Network through Unlicensed Mobile Access Network (UMAN). UMAN has 3 major entities Unlicensed wireless network IP access network UMA Network controller (UNC) UNC authorizes and authenticates the Mobile devices for accessing the Core Network

UMA Architecture ( Contd..)

UMA Security Authentication Authenticate MS with UNC to make secure tunnel Based GSM or UMTS credentials Protocol of authentication is IKEv2 GSM : EAP-SIM or UMTS : EAP-AKA Mutual Authentication of MS and Mobile Network Session Key Generation – IK and CK

UMA Security – EAP Authentication Steps in Authentication ( EAP ) MS establish a link with AP Determines the UNC to be connected Initiate the connection with UNC with IKE UNC connects with the local AAA

UMA Security - EAP Authentication (Contd..) Local AAA linked to the Home AAA EAP procedure is performed between MS and AAA UNC is a relay for EAP messages

EAP-AKA

EAP-AKA steps MS finds an AP MS finds the UNC-SGW and initiates the IKEv2 authentication procedure MS sends to NAI to UNC-SGW which contains IMSI UNC-SGW communicates with local AAA Local server determines the Home AAA by using the NAI. Routing path may include several AAA proxies Leading digits in NAI indicates the authentication procedure is EAP - AKA

EAP-AKA steps ( contd..) AAA requests the user profile and UMTS authentication vectors from HSS UMTS authentication vector consists with RAND, authentication part (AUTH), expected result, IK and CK AAA send the EAP Request/AKA Challenge to UNC-SGW with RAND, AUTH, MAC ( message authentication key ) and re-authentication identity. UNG-SGW forwards the EAP Request/AKA Challenge to MA

EAP-AKA steps ( contd..) MS runs the UMTS algorithm and verifies the AUTH. It computes the RES, IK, CK and calculates MAC using the generated IK and CK MS sends EAP Response/AKA Challenge with RES and MAC AAA verifies the received MAC and compares RES with XRES AAA sends IK and CK to UNC-SGW for the communication with MS UNC-SGW informs the successful authentication to MS

EAP-AKA Fast Re-Authentication Used to reduce the network load due to the authentication AAA server authenticates the user based on the keys derived by the last full authentication Re-authentication ID is generated by the AAA in the full authentication process

EAP-AKA Fast Re-Authentication (Contd..)

EAP-AKA Fast Re-Authentication Steps MS initiates the IKEv2 authentication procedure Re-Authentication identity is sent to the UNC-SGW UNC-SGW sends EAP Response/Identity to AAA with re-authentication Id AAA initiates a counter and sends EAP Request/AKA-Reauthentication message with counter value, MAC and re-authentication id for the next fast authentication. MS verifies the counter value and the MAC and send the EAP Response/AKA-Reauthentication with the same counter value and calculated MAC. AAA server verifies the counter value and MAC EAP success message is sent to MS

Encryption CK is generated during the authentication process Negotiated cryptographic algorithms are used.

Future Work Calls handing off between the cellular network and the wireless LAN with fast authentication process SSO from one UNC to another Introduce UNC to the Mobile Shopping Mall. UNC can be a web service. Introduce XML security to the communication between MS and UNC Authentication of the UNC to the network Some security holes in Fast authentication