i.e. providing enterprise level security. In our
investigation, we developed two different
authentication models for WiMAX in consideration
of enterprise security requirements. In the first
model, we adopted a modified version of EAP-
TTLS defined in the WiMAX standard, in which
enterprise certificates are used instead of certificates
issued by VeriSign. In the second model, we
introduced an additional layer of authentication for
the enterprise on top of the WiMAX authentication
which can be seen as the basic authentication layer.
We will discuss these two authentication modles in
more details later in this paper. Another important
topic in this architecture is WiFi/WiMAX handoff
for application mobility, which can be done via the
HA and FAs in this architecture and a handoff
engine inside the client. Due to space limitation in
this paper, we are not able to provide detailed
discussion on this topic.
3 PROVIDER HOSTED WIMAX
A provider-hosted mobile infrastructure for the
enterprise may offer several key advantages in
comparison to a mobile infrastructure hosted by an
enterprise itself. First of all, an enterprise may
benefit in network (equipment and maintenance)
cost from a provider-hosted mobile enterprise
infrastructure due to economies of scale. In this age
of Cloud Computing today, provider-hosted wireless
connectivity for the enterprise, which we may call
Network as a Service or NaaS, seems quite
straightforward to understand. After all, a Wireless
Network Cloud is a resource that can be shared by
multiple types of users just like a Compute Cloud. A
public network is in fact a shared resource by
different users (i.e. “multi-tenant”) by definition, but
how a public network should be shared by different
enterprises has never been studied, which is the
focus of our discussion here. In NaaS, a WiMAX
network owned by a network provider would be
shared by enterprise users (and consumers) for
accessing services that belong to different
enterprises (and other service providers). Therefore,
the same value that drives Cloud Computing should
also drive what we are proposing here as NaaS. The
second potential advantage of a provider-hosted
mobile architecture for the enterprise is architecture
unification, which means an enterprise would no
longer need to have isolated islands of on-campus
mobile access networks geographically distributed
on one hand and provider hosted access on the other,
but a unified architecture on and off all campuses
around the globe implemented over providers’
networks. Apparently, with such a unified mobile
infrastructure, comes true mobility, which is the
third advantage.
Figure 3: Provided hosted enterprise WiMAX.
With the NaaS vision for the provider-hosted
mobile enterprise proposed in this paper, we now
describe a WiMAX network architecture shown in
Figure 3 which allows us to actually achieve NaaS.
Before proceeding, however, it is important to point
out that a sound security model is essential for a
provider-hosted mobile enterprise infrastructure,
thus should be a key focus, although we will not
treat it as a separate topic below.
As shown in Figure 3, an enterprise network has
all the core network components but it uses WiMAX
networks of service providers for user mobile access
to enterprise services both on and off campus. In the
enterprise network, an AAA server is used for
enterprise device and user authentication, a DHCP
server is for dynamically distributing IP addresses to
enterprise clients, a HA (Home Agent) is for Mobile
IP (tunnel) management, and a IPSec gateway is for
securing data in communication between a mobile
client and a host in the enterprise network, all over a
provider network. Upon entering a WiMAX network
of a provider, a mobile client is authenticated by the
AAA server of the enterprise network and the
provider AAA server is acting as a proxy that
forwards the authentication messages between the
enterprise client and the enterprise AAA server.
After successful authentication with IT certificates
and other credentials, the client is given a Mobile IP
address and a MIP tunnel is established between the
HA and a FA (Foreign Agent) in the provider
WiMAX network. A security association is then
established between the IPSec gateway and the
mobile client for carrying application traffic over a
secure IP connection.
Such an architecture has several key features: 1) it
enables full client mobility because it uses Mobile IP
to allow a client to carry the application traffic in
Provider
Network
Enterprise
Client
Enterprise
Client
ASN
HA
AAA
Provider
Network
ENTERPRISE WIMAX - Building the Next Generation Enterprise Wireless Infrastructure with WiMAX
33