Seamless and Secure Mobility Management with Location-Aware Service (LAS) Broker for Future Mobile Interworking Networks

  • Lee Minsoo (School of Electrical and Electronics Engineering, Chung-Ang University) ;
  • Kim Gwanyeon (School of Electrical and Electronics Engineering, Chung-Ang University) ;
  • Park Sehyun (School of Electrical and Electronics Engineering, Chung-Ang University)
  • Published : 2005.06.01

Abstract

The proliferation of wireless local area networks (WLANs) offering high data rate in hot spot area have spurred the demand for possible WLANs and third-generation (3G) cellular network integration solutions as the initiative step towards 4G systems. This paper provides a novel architecture for seamless location-aware integration of WLANs into 3G cellular networks and also an analysis for the efficient handover techniques. We introduce location as a key context in secure roaming mechanism for context-aware interworking in 4G systems. The fast secure roaming with location-aware authentication is implemented at an entity called location-aware service (LAS) broker that utilizes the concepts of direction of user and pre-warming zone. The location-ware interworking architecture supports seamless roaming services among heterogeneous wireless networks including WLANs, wireless metropolitan area networks (WMANs), and 3G cellular networks. This paper also includes a description of procedures needed to implement efficient mobility and location management. We show how the LAS broker with pre-warming and context transfer can obtain significant lower latency in the vertical handover.

Keywords

References

  1. M. Hazas et al., 'Location-aware computing comes of age,' IEEE Com­puter, vol. 37, pp. 95-97, Feb. 2004
  2. G. D. Abowd et al., 'Cyberguide: A mobile context-aware tour guide,' ACM/Baltzer Wireless Networks, vol. 3, no. 5, pp. 421-433, Oct. 1997 https://doi.org/10.1023/A:1019194325861
  3. M. Lee et al., 'A secure web services for location based services in wire­less networks,' Lecture Notes in Computer Science, vol. 3042, pp. 332-­344, May 2004 https://doi.org/10.1007/978-3-540-24693-0_28
  4. B. Schilit et al., 'Wireless location privacy protection,' IEEE Computer, vol. 36, pp. 135-137, Dec. 2003
  5. 3GPP TR 22.934 v6.2.0, 'Feasibility study on 3GPP system to WLAN interworking (Release 6),' Sept. 2002
  6. V. W.-S. Feng et al, 'WGSN: WLAN-based GPRS environment support node with push mechanism,' Computer J., vol. 47, no. 4, pp. 405-417, July 2004 https://doi.org/10.1093/comjnl/47.4.405
  7. A. K. Salkintzis, 'Interworking techniques and architectures for WLAN/3G integration toward 4G mobile data networks,' IEEE Wireless Commun., vol. 11, pp. 50-61, June 2004 https://doi.org/10.1109/MWC.2004.1308950
  8. D. E. Denning and P. D. MacDoran. 'Location-based authentication: Grounding cyberspace for better security,' Computer Fraud and Security, Feb. 1996
  9. J. E. Bardram et al., 'Context-aware user authentication - supporting proximity-based login in pervasive computing,' in Proc. UbiComp 2003, Oct. 2003
  10. N. Montavont et al., 'Handover management for mobile nodes in IPv6 networks,' IEEE Commun. Mag., vol. 40, pp. 38-43, Aug. 2002
  11. K. D. Wong et al., 'Mobility management scheme for auto-configured wireless IP networks,' IEEE Wireless Commun., vol. 10, pp. 62-69, Oct. 2003
  12. M. Shi et al., 'IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks,' IEEE Wireless Commun., pp. 66-75, Aug. 2004
  13. G. Liu and G. Maguire Jr., 'A class of mobile motion prediction algo­rithms for wireless mobile computing and communicatons,' ACM/Baltzer MONET, vol. 1, no. 2, pp. 113-121, Oct. 1996
  14. T. Liu, P. Bahl, and I. Chlamtac, 'Mobility modeling, location tracking, and trajectory prediction in wireless ATM networks,' IEEE J. Select. Areas Commun., vol. 16, no. 16, pp. 922-936, Aug. 1998 https://doi.org/10.1109/49.709453
  15. V. Bhargavan and M. Jayanth, 'Profile-based next-cell prediction in indoor wireless LAN,' in Proc. IEEE SICON'97, Apr. 1997
  16. W.-S. Soh and H. S. Kim, 'Dynamic bandwidth reservation in cellular networks using road topology based mobility predictions,' in Proc. IEEE INFOCOM 2004, Mar. 2004
  17. M. Lee et al., 'A location-aware secure interworking architecture between 3GPP and WLAN systems,' Lecture Notes in Computer Science, vol. 3506, pp. 400-412, May 2005
  18. P. Mahonen et al., 'Hop-by-hop toward future mobile broadband IP,' IEEE Commun. Mag., vol. 42, pp. 138-146, Mar. 2004
  19. M. Vossiek, 'Wireless local positioning,' IEEE Microwave, vol. 4, pp. 77-­86, Dec. 2003 https://doi.org/10.1109/MMW.2003.1266069
  20. Q. He et a!., 'The auest for personal control over mobile location privacy,' IEEE Commun. Mag., vol. 42, pp. 130-136, May 2004 https://doi.org/10.1109/MCOM.2004.1299356
  21. M. Gruteser et al., 'Protecting privacy in continuous location-tracking applications,' IEEE SECURITY & PRIVACY, vol. 2, pp. 28-34, Mar.-Apr. 2004
  22. A. R. Beresford and F. Stajano, 'Location privacy in pervasive comput­ing,' IEEE Pervasive Computing, vol. 2, pp. 46-55, Jan-Mar. 2003 https://doi.org/10.1109/MPRV.2003.1186725
  23. A. R. Beresford and F. Stajano, 'Mix zones: User privacy in location­aware services,' in Proc. PerSec 2004, Mar. 2004, pp. 127-131 https://doi.org/10.1109/PERCOMW.2004.1276918
  24. V. Marques et al., 'An IP-based QoS architecture for 4G operator scenar­ios,' IEEE Wireless Commun., vol. 10, pp. 54-62, June 2003
  25. I. F. Akyildiz et al., 'A survey of mobility management in next-generation all-IP-based wireless systems,' IEEE Wireless Commun., vol. 11, pp. 16-­28, Aug. 2004
  26. 3GPP TS 33.234 v050, '3G Security; wireless local area network (WLAN) interworking security,' Release 6, work in progress
  27. G. M. Koien and T. Haslestad, 'Security aspects of 3G-WLAN interwork­ing,' IEEE Commun. Mag., vol. 41, pp. 82-88, Nov. 2003
  28. IETF RFC 2716, 'PPP EAP-TLS authentication protocol,' Oct. 1999
  29. G. Kambourakis et al., 'Advanced SSL/TLS-based authentication for se­cure WLAN-3G interworking,' lEE Proc. Commun., vol. 151, no. 5, Oct. 2004 https://doi.org/10.1049/ip-com:20040835(410)151
  30. IEEE Standard 802.11i, July 2003
  31. S. Y. Hui and K. H. Yeung, 'Challenges in the migration to 4G mobile systems,' IEEE Commun. Mag., pp. 54-59, Dec. 2003
  32. J. McNair and Z. Fang, 'Vertical handoffs in fourth-generation multinet­work environments,' IEEE Wireless Commun., vol. 11, pp. 8-15, June 2004
  33. C. Prehofer and Q. Wei, 'Active networks for 4G mobile communication: Motivation, architecture, and application scenarios,' in Proc. IWAN 2002, Dec. 2002
  34. N. Shenoy et al., 'Performance of a framework for seamless integration of cellular and WLANs,' in Proc. OPNETWORK 2004, Sept. 2004
  35. R. Chellappa-Doss, A. Jennings, and N. Shenoy, 'User mobility prediction in hybrid and ad hoc wireless networks,' in Proc. ATNAC 2003, Dec. 2003
  36. 3GPP TS 23.234 v6.1.0, '3GPP system to wireless local area network (WLAN) interworking: System description,' Release 6, June 2004
  37. IEEE Std. 802.16-2001, IEEE Standard for Local and Metropolitan Area Networks, part 16, 'Air interface for fixed broadband wireless access sys­tems,' IEEE Press, 2001
  38. 3GPP TS 23.271 v6.9.0, '3GPPF functional stage 2 description oflocation services (LCS),' Release 6, Sept. 2004
  39. OASIS Security Services TC, Security Assertion Markup Language (SAML) v1.1, Aug. 2003
  40. S. Dixit and R. Prasad, Wireless IP and Building the Mobile Internet, Artech House, 2003
  41. FreeRADIUS, http://www.freeradius.org/
  42. OpenSSL, http://www.openssl.org/
  43. OpenSAML, http://www.opensaml.org/
  44. IEEE 802.1X, 'Port-based network access control,' 2001
  45. IETF Internet Draft, 'EAP tunneled TLS authentication protocol,' Apr. 2004