Doc.: IEEE 802.11-04/xxxr0 Submission November, 2004 Jim TomcikSlide 1 cdma2000-WLAN Interworking Jim Tomcik Raymond Hsu

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
WLAN IW Enhancement for Multiple Authentications Support Notice: Contributors grant free, irrevocable license to 3GPP2 and its Organization Partners to.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
Dynamic Tunnel Management Protocol for IPv4 Traversal of IPv6 Mobile Network Jaehoon Jeong Protocol Engineering Center, ETRI
Omniran GPP Trusted WLAN Access to EPC Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
WLAN-Cellular Interworking Rajesh S. Pazhyannur GTSS, Motorola
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
Doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 1 March 2004 WLAN Backend System Security and WLAN Interworking Security Andrew Myers British.
1 CDMA/GPRS Roaming Proposals Raymond Hsu, Jack Nasielski Feb
Doc.: IEEE /1066r2 Submission July 2011 Robert Moskowitz, VerizonSlide 1 Link Setup Flow Date: Authors: NameCompanyAddressPhone .
Wireless and Security CSCI 5857: Encoding and Encryption.
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
Doc.: IEEE /229r0 Submission Tan Pek-Yew, Panasonic Slide 1 March 2003 Interworking – QoS and Authorization Tan Pek Yew & Cheng Hong Panasonic.
1. WiMAX_NWG_Stage2 & Stage3. WiMAX Forum The WiMAX Forum is a nonprofit organization formed in 2001 to enhance the compatibility and interoperability.
Doc.: IEEE /01149r1 Submission September 2012 Slide 1 WLAN Standardization in 3GPP A Tutorial Date: Authors:
November st IETF MIP6 WG Mobile IPv6 Bootstrapping Architecture using DHCP draft-ohba-mip6-boot-arch-dhcp-00 Yoshihiro Ohba, Rafael Marin Lopez,
EAP Bluetooth Extension Draft-kim-eap-bluetooth-00 Hahnsang Kim (INRIA), Hossam Afifi (INT), Masato Hayashi (Hitachi)
Doc: Submission September 2003 Dorothy Stanley (Agere Systems) IETF Liaison Report September 2003 Dorothy Stanley – Agere Systems IEEE.
11/26 Integration of wireless LAN and 3G wireless - Interworking architecture between 3GPP and WLAN systems Ahmavaara, K.; Haverinen, H.; Pichna, R.; Communications.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Wireless Network Security and Interworking
All Rights Reserved © Alcatel-Lucent 2007, ##### 1 | Presentation Title | January 2007 UMB Security Evolution Proposal Abstract: This contribution proposes.
Doc.: IEEE /0691r0 Submission May 2011 Dorothy Stanley, Aruba NetworksSlide 1 IEEE IETF Liaison Report Date: Authors:
Doc.: IEEE /209r0 Submission 1 March GPP SA2Slide 1 3GPP System – WLAN Interworking Principles and Status From 3GPP SA2 Presented.
Doc.: IEEE /01047r2 Submission NameAffiliationsAddressPhone Ping Fang Huawei Technologies Co., Ltd. Bldg 7, Vision Software Park, Road Gaoxin.
Doc.: IEEE /162r0 Submission March 2003 Stephen McCann & Max Riegel, SiemensSlide 1 Wireless Interworking Stephen McCann & Max Riegel, Siemens.
PANA Framework Prakash Jayaraman, Rafa Marin Lopez, Yoshihiro Ohba, Mohan Parthasarathy, Alper Yegin IETF 59.
Doc.: IEEE /635r1 Submission November 2001 Peter A. Dahl, Verizon WirelessSlide 1 CDMA2000 [the other 3G Standard] Peter Dahl Verizon Wireless.
SAVI Analysis for PANA with SLACC Yilan Ding IETF 79 draft-ding-savi-pana-with-slacc-00.
Doc.: IEEE /843r0 Submission Cheng Hong, Tan Pek-Yew, Panasonic Slide 1 November 2003 Interworking – WLAN Control Cheng Hong & Tan Pek Yew Panasonic.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
3GPP GBA Overview Adrian Escott.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Doc.: IEEE /0690r0 Submission Andrew Myers, BT Slide 1 July GPP SA3 Interworking Security Issues II Andrew Myers British Telecommunications.
Wireless Network Security CSIS 5857: Encoding and Encryption.
1 Remote IP Access - Stage 2 Architecture proposal for adoption Peerapol Tinnakornsrisuphap Anand.
Doc. : IEEE /xxxr0 Submission Cheng Hong, Tan Pek Yew Slide 1 May 2004 Handover scenarios and requirements Cheng Hong, Tan Pek Yew (Panasonic)
Channel Binding Support for EAP Methods Charles Clancy, Katrin Hoeper.
Doc.: IEEE /0730r0 Submission July 2005 Stefano M. Faccin, NokiaSlide 1 3gpp2-liaison-report-july-2005 Notice: This document has been prepared.
November 2001 Lars Falk, TeliaSlide 1 doc.: IEEE /617r1 Submission Status of 3G Interworking Lars Falk, Telia.
San Diego, August 2004 IETF 60 th – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-01) Gerardo Giaretta.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE /230r0 Submission Robert Moskowitz, Trusecure/ICSALabsSlide 1 March 2002 Proxied Preauthorized Roaming Robert Moskowitz Trusecure Corporation.
Doc.: IEEE /1436r0 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 L2 Domain Indication Mike Moreton, STMicroelectronics 15 th.
August 2, 2005IETF63 EAP WG AAA-Key Derivation with Lower-Layer Parameter Binding (draft-ohba-eap-aaakey-binding-01.txt) Yoshihiro Ohba (Toshiba) Mayumi.
Page 1 Inter Working Between Trusted and Non-Trusted Models LBS Roaming Meeting, Macau March 22, 2007 Inter Working Between Trusted and Non-Trusted Models.
WLAN IW Enhancement for Multiple Authentications Support QUALCOMM Inc.: Raymond Hsu, QUALCOMM Inc.: Masa Shirota,
Doc.: IEEE /0122r0 Submission January 2012 Dorothy Stanley, Aruba NetworksSlide 1 IEEE IETF Liaison Report Date: Authors:
Wi-Fi Alliance Liaison Report on 3GPP2 WLAN Interworking Inma Carrion Wi-Fi liaison
Pre-authentication Problem Statement (draft-ohba-hokeyp-preauth-ps-00
<draft-ohba-pana-framework-00.txt>
for IP Mobility Protocols
Discussions on FILS Authentication
MAC Address Hijacking Problem
OMA – SUPL Security SUPL 1.0 has reliable security for H-SLP non-emergency location of a SET 3GPP solution 1: GBA (Generic Bootstrap Architecture) support.
3GPP2-WLAN Interworking update
WLAN Interworking scenarios
Security Activities in IETF in support of Mobile IP
3GPP2-WLAN Interworking update
Presentation transcript:

doc.: IEEE /xxxr0 Submission November, 2004 Jim TomcikSlide 1 cdma2000-WLAN Interworking Jim Tomcik Raymond Hsu November, 2004 San Antonio, TX

doc.: IEEE /xxxr0 Submission November, 2004 Jim TomcikSlide 2 Objectives Phase-1 Objectives –Scenario 1: Common billing (scenario 1) No 3GPP2 specification work needed –Scenario 2: 3GPP2-based access control, direct Internet access, and accounting Common root key (A-key or MN-AAA key) for both WLAN & cdma2000 authentication Direct Internet access from WLAN system WLAN accounting available to home cdma2000 operator Phase-2 Objectives –Scenario 3: Access to home cdma2000 system from WLAN system e.g. Access to IMS, WAP, MMS in the home system Via tunneling between WLAN and cdma2000 systems –Scenario 4: Session continuity Maintain IP connectivity while moving between cdma2000 and WLAN systems

doc.: IEEE /xxxr0 Submission November, 2004 Jim TomcikSlide 3 Status Phase-1 Status (X.S0028) –Finished R&F (“Review and Freeze”) –Currently in V&V (“Verification and Validation”) –Publication in 1Q/2005 Phase-2 Status –No work-plan yet –High-level discussion has started in the Oct. 3GPP2 meeting

doc.: IEEE /xxxr0 Submission November, 2004 Jim TomcikSlide 4 Phase-1 Architecture

doc.: IEEE /xxxr0 Submission November, 2004 Jim TomcikSlide 5 Some Phase-1 Detail SSID for system selection –SSID may be used to identify the serving WLAN system, or a home CDMA2000 system that has roaming agreement with the serving WLAN system –MS is configured with a list of preferred SSIDs –MS uses passive scan or active scan to obtain available SSIDs WLAN access authentication key (WKEY) –WKEY may be generated from a CDMA2000 root key (e.g., A-key, MN- AAA key) Why? Cryptographic separation - if WKEY is compromised, the root key is still safe –An alternative approach is to pre-configure the MS with a separate WKEY –MS uses (R)UIM procedures (IS-820) to bootstrap WKEY If A-key is used as the root key, WKEY is derived from the SMEKEY If MN-AAA key is used as the root key, WKEY is derived from the MN-AAA authenticator –EAP is used to exchange key materials between MS and home AAA for bootstrapping WKEY –If A-key is used as the root key, home AAA interface with HLR/AC to SMEKEY

doc.: IEEE /xxxr0 Submission November, 2004 Jim TomcikSlide 6 Some Phase-1 Detail WLAN access authentication –WKEY is used as the secret for authentication –Two EAP authentication methods are allowed: EAP-AKA EAP-TLS with Pre-Shared Key (PSK) IEEE i for Privacy protection in WLAN system –If MS is authenticated, MS and home AAA derive Pairwise-Master Key (PMK) –Home AAA distributes the PMK to the AP serving the MS –MS and AP use the PMK to derive session keys for privacy protection Internet access via WLAN system directly –If MS is authenticated, WLAN system assigns an IP address –Not require to traverse through the home CDMA2000 system WLAN accounting sent to home CDMA2000 system –Standard IETF RADIUS attributes –No 3GPP2 vendor-specific attributes

doc.: IEEE /xxxr0 Submission November, 2004 Jim TomcikSlide 7 EAP-AKA Message Flows