An Inter-provider Roaming Authentication and Key Establishment Protocol Providing Anonymity in IEEE 802.16e Networks

IEEE 802.16e 네트워크에서 익명성을 제공하는 사업자간 로밍 인증 및 키 설정 프로토콜

  • 박영만 (KT 인프라연구소) ;
  • 박상규 (한양대학교 전자통신컴퓨터공학부)
  • Published : 2006.11.30

Abstract

In this Paper, we present a novel authentication and key exchange(AKE) protocol for inter-NSP(provider) roaming in IEEE 802.16e networks. The proposed protocol allows performing both user and device authentication jointly by using two different authentication credentials and Provides user anonymity and session key establishment. Also, this protocol requires only two round number message exchange between foreign network and home network.

본 논문에서는 IEEE 802.16e 네트워크에서 통신 사업자간 로밍을 위한 새로운 인증 및 키 설정(AKE: Authentication and Key Establishment) 프로토콜을 제안한다. 제안된 프로토콜은 두 개의 다른 인증 credentials를 사용하여 사용자(user) 및 단말(device) 인증을 함께 수행하며 사용자 익명성과 키 설정을 제공한다. 또한, 제안된 프로토콜에서 홈 네트워크(Home Network: HN)와 외부 네트워크(Foreign Network: FN) 사이의 메시지 교화 횟수는 단지 2 라운드(round) 수가 필요하다.

Keywords

References

  1. IEEE Std. 802.16e-2005, 'Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems,' February 2006
  2. WiMax Forum Network Working Group Draft, 'WiMAX End-to-End Network Systems Architecture, Stage 3: Detailed Protocols and Procedures,' April 2006
  3. WiMax Forum Network Working Group Draft, 'WiMAX End-to-End Network Systems Architecture, Stage 2: Architecture Tenets, Reference Model and Reference Points ,' April 2005
  4. B. Aboba, L. Blunk, and J. Vollbrecht, 'Extensible Authentication Protocol (EAP),' IETF RFC 3748, June 2004
  5. B. Aboba, M. Beadles, J. Arkko and P.Eronen, 'The Network Access Identifier,' IETF RFC 4282, December 2005
  6. U. Meyer, J. Cordasco, and S. Wetzel, 'An Approach to Enhance Inter-Provider Roaming Through Secret Sharing and its Application to WLANs,' Proceedings of The ACM Workshop on Wireless Mobile Applications and Services on WLAN Hotspots(WMAHS'05), September 2005
  7. C. Rigney, S. Willens, A. Rubens, and W. Simpson, 'Remote Authentication Dial-In User Service (RADIUS),' IETF RFC 2865, June 2000
  8. Guonin Yang, D.S.Wong, X.Deng, 'Efficient Anonymous Roaming and Its Security Analysis', Proceedings of the 3rd International Conference on Applied Cryptography and Network Security(ACNS2005), LNCS 3531, Springer-Verlag, 2005
  9. L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller, 'Efficient authentication and key distribution in Wireless IP networks,' IEEE Wireless Communications Magazine, 10(6), 2003
  10. A. Menezes, P. C. van Osrschot, and S. A. Vanstone, 'Handbook of Applied Cryptography', CRC Press, 1996