Thus, in our proposed authentication procedure,
we assume the following:
• Secure tunnels are established between the
Mobility Management Entity (MME) and the Home
Subscriber Server (HSS) server on one hand and
between the HSS and the HIU on the other hand to
secure the transfer of the users’ authentication
parameters.
• The hybrid interworking unit shares a key
(K
MME/HIU
) with the MME that will be dynamically
refreshed by the HSS. The same, the HIU shares also
a key (K
AAA/HIU
) with the Authentication,
Authorization and Accouting AAA server of the
WLAN network (AAA
WLAN
).
• The HIU may choose any authentication vector
(pair of tempID and temp K) to authenticate the MT
(i.e. there is not a specific authentication vector for a
specific MT).
• An efficient authentication process in our case
(i.e. handover from LTE system to WLAN system)
should enclose three types of mutual authentication:
First, a mutual authentication between the MT and
the home network (LTE network). Second, a mutual
authentication between the LTE network and the
WLAN network. Finally, a mutual authentication
between the MT and the visited network (WLAN
network).
Figure 2 explains our proposed authentication
procedure for handover from LTE system to WLAN
system.
The messages sequences are presented below:
1. MT initiates the measurement process
periodically or after a new discovered pre-handover
trigger such as MT velocity variation, LTE
performance degradation, or a new discovered
network, etc.
2. Based on these measurements (MT velocity,
network load…), if the WLAN system is pre-
selected as the best available network in the MT
coverage area, the MT decides to execute a pre-
handover process to the WLAN network.
3. The MT initiates a pre-authentication procedure
with the MME of its home network by sending a
pre-authentication request containing the MT
temporary identity in the LTE system (ID
MTTemp LTE
).
As the MT has already execute successfully the
initial authentication process with the MME since its
first attachment to the LTE network, the MME at
this step uses one unused authentication vector
already retrieved from the HSS since the initial
authentication to do the mutual authentication with
the MT.
4. At this step, the MME initiates a mutual
authentication with the HIU to secure the
communication between them. So, the MME sends
to the HIU a message that contains the permanent
identity of the MT (IMSI
MT
), a random number
(Rand1), its signature (SRES1), a Timestamp (T
MME
)
and the MME identity (id
MME
). All encrypted with
their shared key K
MME/HIU
.
5. As a response, the HIU sends a second random
number Rand2, its signature (SRES2), a Timestamp
(T
HIU
) and the MT’s identity and key in the WLAN.
The message is encrypted by the shared key
K
MME/HIU
. In fact, the ID
MT/WLAN
is a function of the
MT permanent identity (IMSI
MT
) and the temporary
identity (temp ID) generated by the HIU in one
authentication vector. The same, the K
MT/WLAN
is a
function of the MT permanent identity (IMSI
MT
) and
the temporary key (temp K) in this same selected
authentication vector.
6. In case of successful authentication, the MME
sends to the MT an authentication request that
contains the values of RAND and AUTN.
7. The MT at its turn authenticates the MME by
checking the AUTN, generates the CK and IK keys
and calculates the RES.
8. The MME compares the obtained RES with the
XRES retrieved from the authentication vector and if
the MT is successfully authenticated, the MME
sends its authentication parameters (ID
MT/WLAN
,
K
MT/WLAN
) encrypted with MT’s CK,
9. At this step, the MT and the HIU compute the
Master Key (MK) and the Local Re-authentication
key (LRK). The (MK) key is obtained by the
application of a pseudo random function (prf) on the
ID
MT/WLAN
and the K
MT/WLAN
according to equation (1)
while the (LRK) is derived by using a key derivation
function on the MK and the AAA
WLAN
identity.
=
/
/
(1)
=
|
(2)
10. The HIU sends the LRK to the AAA
WLAN
encrypted with their shared key K
AAA/HIU
,
11. The K
AAA/HIU
at this step derives the Master
Session Key MSK from the LRK.
12. The last part of this authentication procedure
concerns the one established between the MT, the
AP and the AAA
WLAN
to secure the communication
between these equipment. Therefore, firstly, the AP
requires the identity of the MT through an EAP
request. The MT at its turn responds by an EAP
response that contains its ID
MT/WLAN
. The AP relays
this response to the AAA
WLAN
through an access
request. At this step, an EAP method is executed and
WINSYS2012-InternationalConferenceonWirelessInformationNetworksandSystems
252