A Security Architecture for Mobility-Related Services

In future wireless networks, mobility-related services, such as candidate access router discovery (CARD), will play a significant role in realizing truly ubiquitous, seamless connectivity. In order for these services to be realized, however, their particular security concerns must be addressed. Moreover, the security solution must be flexible and highly configurable in order to meet the demands of inter-domain roaming agreements. In this paper, we explore a number of alternatives and present a general architecture, iARSec, that provides both authentication as well as explicit authorization for services running between neighboring access routers.

[1]  Sebastian Zander,et al.  The design of an extended AAAC architecture , 2002 .

[2]  Charles E. Perkins,et al.  Mobile IP joins forces with AAA , 2000, IEEE Wirel. Commun..

[3]  Angelos D. Keromytis,et al.  Efficient, DoS-resistant, secure key exchange for internet protocols , 2001, CCS '02.

[4]  Charles E. Perkins,et al.  Mobile IP , 1997, IEEE Communications Magazine.

[5]  김용성,et al.  Fast Handovers for Mobile IPv6 구현 및 Mobile IPv6 와의 성능 평가 , 2005 .

[6]  Stephen E. Deering,et al.  Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.

[7]  Janise McNair,et al.  Mobility management in current and future communications networks , 1998, IEEE Netw..

[8]  Jon Postel,et al.  Internet Protocol , 1981, RFC.

[9]  Christopher Metz,et al.  On the Web: AAA Protocols: Authentication, Authorization, and Accounting for the Internet , 1999, IEEE Internet Comput..

[10]  Dan Harkins,et al.  The Internet Key Exchange (IKE) , 1998, RFC.

[11]  Päivi Kankaanpää Candidate Access Router Discovery , .

[12]  Ian F. Akyildiz,et al.  On location management for personal communications networks , 1996 .

[13]  Ramón Cáceres,et al.  Fast and scalable wireless handoffs in support of mobile Internet audio , 1998, Mob. Networks Appl..

[14]  James Kempf,et al.  Problem Description: Reasons For Performing Context Transfers Between Nodes in an IP Access Network , 2002, RFC.

[15]  Hui Luo,et al.  WiFi: what's next? , 2002, IEEE Commun. Mag..

[16]  Charles E. Perkins,et al.  Fast handovers and context transfers in mobile networks , 2001, CCRV.

[17]  Jari Arkko,et al.  The Network Access Identifier , 2005, RFC.

[18]  Randy H. Katz,et al.  Adaptation and mobility in wireless information systems , 2002, IEEE Communications Magazine.

[19]  Charlie Kaufman,et al.  Internet Key Exchange (IKEv2) Protocol , 2005, RFC.

[20]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[21]  S. Tabbane,et al.  Location management methods for third-generation mobile systems , 1997, IEEE Commun. Mag..

[22]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[23]  Jari Arkko,et al.  Diameter Base Protocol , 2003, RFC.

[24]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[25]  Richard D. Gitlin,et al.  Secure candidate access router discovery , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[26]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .