Download presentation
Presentation is loading. Please wait.
1
IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-09-00xx-00-sec
Title: The Role of a Media Independent Authenticator Date Submitted: December 30, 2009 Present at IEEE a Teleconference, January 5, 2010 Authors: Lily Chen (NIST) Abstract: This document looks into media specific handover cases to understand the role of a “media independent authenticator”. The presentation also identifies some open issues for further study. xx-00-sec 1
2
IEEE 802.21 presentation release statements
This document has been prepared to assist the IEEE Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE The contributor is familiar with IEEE patent policy, as stated in Section 6 of the IEEE-SA Standards Board bylaws < and in Understanding Patent Issues During IEEE Standards Development xx-00-sec 2
3
Background The a document #102 introduced a network entity called “media independent authenticator (MIA)” to accommodate media independent (proactive) authentication protocol. The document #102 considers a MIA as a key holder (MIA-KH) and further introduced a new key hierarchy to prepared the “media specific authenticator (MSA)” with a media specific PMK (PMK_MS) for a fast handover. Document #164 discussed key distribution options from a MIA to MSAs. This presentation will look into different handover cases to understand the role of a MIA.
4
Authentication Terminologies
Full Authentication - usually with a server and can be executed in a proactive way such as EAP with the home authentication server 3GPP AKA with Authentication Center in HLR (HS) Fast Authentication - can be executed with a “local server” in a proactive way such as EAP Re-authentication Protocol (ERP) Session Key Establishment - usually established with a PoA to protect wireless data traffic such as 4-way handshake in Fast transition defined in r TEK 3-way handshake defined in
5
Authentication options in 802.11
Full (and fast) Authentication is executed in higher layer and out of the scope of It assumes that a full (or fast) authentication will provide a MSK (or rMSK) to the “authenticator” and then further derive a PMK for an AP which STA will be associated with Session Key Establishment is either 4-way handshake in ; or Fast transition defined in r In case of handover, it executes either Full (or fast) authentication and 4-way handshake; or Fast BSS transition protocol defined in r
6
Authentication Options in 802.16
Full (and fast) Authentication (PKMv1 or PKMv2) is executed in a MAC sub-layer. In case of EAP, it is encapsulated. Session Key Establishment is A 3-way TEK (GTEK, GKEK) handshake (and 2-way TEK delivery); In case of handover, it has three options (00) Full (or fast) authentication and TEK 3-way handshake; (10) Re-use PMK for a TEK 3-way handshake. No full authentication. (11) Re-use PMK and TEK. No full authentication and no TEK 3-way handshake.
7
Authentication options in 3GPP
Full (and fast) Authentication is AKA, which will generate session key IK and CK. In case of handover, it executes Full authentication to obtain CK and IK; or Nothing. Re-use IK and CK.
8
Proposed MIA Key Hierarchy
MSK or rMSK Document #102 proposed the new key hierarchy. Document #164 discussed options to distribute PMK-MSs to different MSAs. The purpose is to prepare for way handshake; way handshake, without going back to the authentication server for full authentication in case of handover. PMK-MI PMK-MS1 PMK-MS2 MSA1 MSA2
9
802.11r Key Hierarchy After a full (proactive) EAP authentication, MIA may deliver MSK (or rMSK) to PMK-R0 key holder. Why not deliver a PMK-MS to PMK-R1 key holder? It will require a modification of R0 KH and R1 KHs interface; and It will require a modification to authentication client in MS, since MS need to derive a different key hierarchy. PMK-R0 KH
10
Key Hierarchy After a full (proactive) EAP authentication, MIA may deliver MSK (or rMSK) to the BS. Why not generate different PMK-MSs for different BSs? With options “10” and “11”, serving BS is configured to deliver the same PMK or PMK and TEKs to the target BS through (or WiMAX) backbone; and It will demand to modify authentication client in MS to derive a different key hierarchy. MSK PMK EIK AK MAC-Keys KEK Generated in the BS and MS *KEK is used to deliver TEKs in the 3-way TEK handshake.
11
3GPP (AKA) Key Hierarchy
CK IK USIM K f1 RAND SQN AMF MAC f2 f3 f4 f5 XRES CK IK AK Generate Full authentication is executed with AuC in HLR(HS). In MS, CK and IK are derived in USIM. CK and IK are re-used in 3GPP to 3GPP handover. It is a question that how a MIA can help.
12
When a MIA may be Needed & for What?
If for the next handover, a full authentication is needed, then a MIA may accommodate a proactive authentication, when it is possible*. The role includes Forward the authentication protocol to the corresponding authentication server; and Deliver the keys to the target MSA. But The authentication protocol must be the one specified for the media specific access authentication. The keys must match whatever the MIA required. *We will discuss the possibility for each media late.
13
When a MIA is Not Needed and Why?
In the following case, MIA is not needed: The handover is A r fast BSS transition; or A handover with option “10” (Re-use PMK ) or “11” (Re-use PMK and TEKs); 3GPP handover. Why If a MIA is involved in the above case, it will require to modify the existing MSA (or PoA). Otherwise, The existing MSAs would not be able to use the keys delivered by the MIA.
14
Inside a Mobile Station
In order to access different media networks, a mobile station must be able to conduct authentication with different media specific access network. Specifically, it must support EAP or PSK; PKMv1 or/and PKMv2; 3GPP AKA; and more They may use different credentials and authenticate different identities. They may even be executed with different servers (entities)! Authentication Client Authentication Client 3GPP USIM Media Independent Authentication Client? MS
15
Authentication Credentials for Different Media
EAP EAP- (T)TLS: server certificate, client certificate (optional) or/and password. EAP-GPSK: pre-shared symmetric key PKMv1 or PKMv2 Manufacture issued device (MS) certificate for RSA public key; BS certificate for signature (PKMv2); plus EAP credentials (PKMv2- EAP after RSA device mutual authorization.) 3GPP AKA USIM with symmetric key K. What will be the authentication credentials and identities for media independent authentication?
16
Issues with Media Independent Authentication
If a media independent authentication is introduced, What will be the authentication credentials and identities for media independent authentication? Is media independent authentication client a standalone client? In order to access a media specific network, the MN will execute either a media specific or media independent authentication, Who is entitled to make such modification to media specific PoAs? 21a can not make these decisions! Different media assume different trust models. For example, an AP is not trusted in the same way as an BS. 21a is not in a position to combine the different trust models in one “media independent authentication and key hierarchy”!
17
A Possible Picture When the target network is a and a full or fast authentication is needed, PoS accommodates a proactive full or fast authentication required for access. MSK is delivered to a PKM-R0 KH, which is considered as a MSA and a PMK-R1 KH is a PoA. Auth Client Auth Client 3GPP USIM MIHF MN PoS- MIA Auth Server Auth Server 3GPP AuC/HLR AAA MSK PMK-R0 KH PMK-R1 KHA PMK-R1 KHB PMK-R1A PMK-R1B Existing r
18
Summary and Conclusion
It is indicated that PoS may be used as a MIA to accommodate a proactive (full or fast) authentication, even though some open issues are pending for further study (see next page). The proactive authentication must be the one specified for the target media specific network access authentication. A general media independent authentication and key hierarchy will require modifications of existing MSAs, PoAs. media specific handover options, and media specific trust model. 21a should not introduce a media independent authentication and media independent key hierarchy to override existing media specific authentication.
19
Open Issues In 802.11, PMK-R0 key holder is an authenticator.
It accepts a MSK after a full (or fast) authentication. Does it need any change to accept MSK from MIA without being involved in the full (or fast) authentication? In , in case of PKMv1, the authentication is between a MS and a BS, how to use a MIA? In , in case of PKMv2, BS and MS actually first discovery each other and link up before EAP starts between MS and AAA server. If a MIA is employed, how can the BS be involved in a proactive authentication? Without the BS involved, EAP cannot be encapsulated in a MAC sub-layer. Does this imply a change to BS or PMKv2? How to use a MIA in 3GPP case?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.