IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN:21-09-0164-00-0sec Title: Detailed analysis on MIA/MSA architecture

advertisement
IEEE 802.21 MEDIA INDEPENDENT HANDOVER
DCN:21-09-0164-00-0sec
Title: Detailed analysis on MIA/MSA architecture
Date Submitted:
Authors or Source(s): Rafael Marín-López,
Fernando Bernal
Abstract:
This document discusses specific details on the
MIA/MSA architecture, addressing different key
distribution models (push and pull) and providing
entities’ required functionalities.
IEEE 802.21 presentation release statements
This document has been prepared to assist the IEEE 802.21 Working Group. It is
offered as a basis for discussion and is not binding on the contributing
individual(s) or organization(s). The material in this document is subject to
change in form and content after further study. The contributor(s) reserve(s)
the right to add, amend or withdraw material contained herein.
The contributor grants a free, irrevocable license to the IEEE to incorporate
material contained in this contribution, and any modifications thereof, in the
creation of an IEEE Standards publication; to copyright in the IEEE’s name
any IEEE Standards publication even though it may include portions of this
contribution; and at the IEEE’s sole discretion to permit others to reproduce in
whole or in part the resulting IEEE Standards publication. The contributor also
acknowledges and accepts that this contribution may be made public by IEEE
802.21.
The contributor is familiar with IEEE patent policy, as stated in Section 6 of the
IEEE-SA Standards Board bylaws
<http://standards.ieee.org/guides/bylaws/sect6-7.html#6> and in
Understanding Patent Issues During IEEE Standards Development
http://standards.ieee.org/board/pat/faq.pdf>
Media Independent Proactive
authentication
MN
Serving
MSA-KH
Target
MSA-KH
MIA-KH
1*. Media-specific network access authentication
MSK
MSK
.
.
.
Pro-auth
Trigger
2. Proactive media-independent authentication
MSK’/rMSK
MSK’/rMSK
MI-PMK
MI-PMK
1*. Only required if the MN has no already access
to the network through Serving MSA-KH
L-AAA
H-AAA
MN
• Required functionalities
– If MN needs to get network access through the Serving MSA.
• EAP peer for a media-specific authentication.
• Media specific EAP lower layer.
• Secure Association protocol client for the specific media
– If EAP is used for (proactive) media-independent authentication
• EAP peer for media-independent authentication
• Media-independent EAP lower-layer
– If EAP is NOT used for (proactive) media-independent
authentication
• authentication protocol implementation
• media-independent client transport for the authentication protocol.
Serving MSA-KH
• Required functionalities
– EAP authenticator for media-specific
authentication.
– AAA protocol client for a specific media
– Secure Association protocol server for the specific
media
MIA-KH
• Required functionalities
– If EAP is used for (proactive) media-independent
authentication
• EAP server for media-independent authentication
• Media-independent EAP lower-layer
– If EAP is NOT used for (proactive) mediaindependent authentication
• authentication protocol implementation
• media-independent client transport for the
authentication protocol.
– AAA protocol client for a specific media
(H) AAA Server
• Required functionalities
– EAP server for media specific authentication
– EAP server for proactive media-independent
authentication
– AAA protocol for media specific authentication
– AAA protocol for (proactive) media independent
authentication.
Push Key distribution
MN
Serving
MSA-KH
Target
MSA-KH
MI-PMK
MI-PMK
Key Dist.
Trigger
MS-PMK
3*’. Proactive (Push) Key Dist. signaling
4’. Push key
installation
MS-PMK
Handoff to
target MSA-KH
MIA-KH
.
.
.
5. Security Association
Protocol
3*’. Optional if during Proactive authentication signaling the
MIA pushes MS-PMKs in all target MSAs under MIA-KH control.
MS-PMK
MN
• Required functionalities
– Media independent client protocol for indicating
proactive key distribution.
• This signaling indicates that key distribution is push
model
– Key derivation mechanism to derive MS-PMK.
– Secure Association protocol client for the specific
media
Target MSA-KH
• Required functionalities
– Interface with MIA-KH that allows to receiving a
key in a push fashion.
– Secure Association protocol server for the specific
media
MIA-KH
• Required functionalities
– Media independent server protocol for proactive
key distribution.
– Interface with MSA-KH for sending a key in a push
fashion.
Pull Key Distribution
MN
Serving
MSA-KH
Target
MSA-KH
MIA-KH
MI-PMK
MI-PMK
*Key Dist.
Trigger
3*’’. Proactive (Pull) Key Dist. signaling [@MIA-MIHF-ID]
Handoff to
target MSA-KH
4’’. Media-specific network access authentication
[MN’s identity = MN-MIHF-ID@MIA-MIHF-ID]
MSK
MSK
5. Security Association
Protocol
3*’’. Optional if during Proactive authentication signaling the
MN has been provided with the MIA-KH’s realm information
or it has been obtained by means of 802.21 IS
MN
• Required functionalities
– Media independent client protocol for indicating
proactive key distribution.
• This signaling indicates that key distribution is pull model
• The MN receives from MIA information about MIA’s realm
that it is useful for AAA routing.
– EAP peer for a media-specific authentication.
– Media specific EAP lower layer.
– Secure Association protocol client for the specific
media
Target MSA-KH
• Required functionalities
– EAP authenticator for a specific media
– AAA client for a specific media
– Secure Association protocol server for the specific
media
MIA-KH
• Required functionalities
– Media independent server protocol for proactive
key distribution.
• This protocol provides MN with MIA’s realm to build an
MN’s identity that it is useful for AAA routing.
– EAP server for media-specific authentication
– AAA protocol server for media-specific
authentication
MIH user processing
EAP/AAA message
vs.
MIHF processing EAP/AAA message
MIH user processing EAP/AAA messages
• EAP layers (EAP method, EAP auth/peer layer,
EAP layer) become MIH user.
• MIHF acts as EAP lower-layer and, as per EAP
specification, it holds the MSK. Thus it can
derive the MI-PMK and MS-PMKs.
• In pull key distribution
– EAP method layer is the MIH user and requests a key (MSPMK) to the MIHF to perform the EAP method.
• In push key distribution
– The protocol used to push a key into the MS-PMK becomes
MIH User and request a MS-PMK to MIHF.
MIH user processing EAP/AAA messages
MIH User
MIH User
EAP method layer
Protocol X for push key
installation
EAP peer layer
EAP layer
MIHF
(e.g. MIH EAP lower-layer)
MSK, MI-PMK, MS-PMKs...
MIH-SAP for EAP authentication
MIH-SAP for pull key distribution
MIH-SAP for push key distribution
MIHF processing EAP/AAA messages
• In the MN:
– Two EAP stacks shall be deployed in the MN. One
for the media specific authentication and other for
the media independent authentication.
• In the MIH authenticator:
– It is used to media-independent authentication
– EAP authenticator stack.
– AAA client implemented within the MIHF may be
required when MIH is acting as EAP authenticator
in pass-through mode.
Discussion
• A priori, “MIH user processing EAP / AAA
messages” model seems a simpler solution
and simplify future deployments.
• But it needs to define the interface between
MIHF and MIH user.
Other pending questions
• Should proactive authentication signaling be
flexible enough to support multiple
authentication protocols not only EAP?
• Is it enough to use EAP as authentication
protocol?
Download