EP1782575A1 - Method and apparatus for supporting secure handover - Google Patents

Method and apparatus for supporting secure handover

Info

Publication number
EP1782575A1
EP1782575A1 EP04786235A EP04786235A EP1782575A1 EP 1782575 A1 EP1782575 A1 EP 1782575A1 EP 04786235 A EP04786235 A EP 04786235A EP 04786235 A EP04786235 A EP 04786235A EP 1782575 A1 EP1782575 A1 EP 1782575A1
Authority
EP
European Patent Office
Prior art keywords
network element
candidate
elements
network
handover
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP04786235A
Other languages
German (de)
French (fr)
Inventor
Anand R. Prasad
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NTT Docomo Inc
Original Assignee
NTT Docomo Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NTT Docomo Inc filed Critical NTT Docomo Inc
Publication of EP1782575A1 publication Critical patent/EP1782575A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • H04W36/0038Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos

Definitions

  • the present invention relates to a method and an apparatus for secure handover, and in particular it relates to the selection of handover candidates based on the network topology and the creation of trust with these candidates.
  • wireless networks may comprise mobile phone communications networks, typically also referred to as so-called cellular networks, wireless computer networks such as wireless LANs, or hybrid networks which include a variety of dif ⁇ ferent network technologies and corresponding terminals.
  • a typical property of wireless networks consists in the fact that usually they are or ⁇ ganised in cells which means that terminals can access to the network through so- called access points which serve a certain range or area surrounding them.
  • the communication between individual terminals which are not located in the same cell then is realised either through some backbone network which receives the informa- tion from the access point and delivers it to another access point close to the termi ⁇ nal device which is the intended recipient of the information, or the information may be transmitted from access point to access point until the access point is reached in the range of which the intended recipient terminal is located.
  • Fig. 1 shows a first access point AP1 having a certain range 100 within which it can communicate with mobile terminals, a mobile terminal MT1 located in this range, and moving to the coverage range 110 of another access point AP2.
  • some kind of authentication and authorisation as well as accounting must be performed.
  • this kind of task is performed by an authentication, authorisation and ac ⁇ counting (AAA) server as shown in Fig. 1.
  • AAA server is in charge of perform ⁇ ing authentication and authorisation checks when a terminal wishes to access a network, it typically is responsible for the general security environment like the gen ⁇ eration and distribution of keys for communication sessions, the accounting of services rendered, and the like.
  • AP1 When a mobile terminal MT1 accesses the network through for example access point AP1 , then AP1 contacts the AAA server in order to at first identify and authen ⁇ ticate the mobile terminal MT1 and then to negotiate some security environment such as encryption keys used during the communications session.
  • AP2 moves then to the range 110 of access point AP2, the same authenti ⁇ cation and authorisation procedure has to be performed with respect to the new access point AP2 by contacting the AAA server through access point AP2 to per ⁇ form the authentication and authorisation.
  • a method for supporting a secure handover which employs the creation of a trust relation be ⁇ tween neighbouring network elements to which the mobile device can handover. Once such a trust relationship has been created between neighbouring network elements such as access points, the handover can be performed in a faster and more efficient way by avoiding the need to re-authenticate the mobile device through contacting the AAA server.
  • the method includes the generation of a neighbour graph which is a data set which includes an identification of those neighbouring network elements (access points) to which a handover could be performed, as well as a se ⁇ curity context, security association or security information which enables the direct handover without re-contacting the AAA server between neighbouring network ele ⁇ ments.
  • the neighbouring graph contains a list or set of the IDs of the access points to which a handover is possible, and a set of keys for the communication between the neighbouring access points or base stations.
  • keys may for example be encryption keys, integrity check keys, it may also include an identification of the encryption algorithm or a packet of authentication algorithm identification.
  • the generation of the neighbouring graph includes the selection or identification of those neighbouring networking elements which are candidates for a handover.
  • an identification or selection ref ⁇ erence could be made to the network topology which may for example be stored in a management machine which maintains a description of the network topology.
  • the method for supporting a the secure handover includes the transmission of the security context which has been generated for the neighbouring elements included in the neighbour graph to the candidate elements from the originating network element from which the handover should originate.
  • the neighbour graph information including the candi ⁇ dates for handover and the corresponding security context can be transmitted to a network element as "piggyback" when it logs on to an AAA server. This means that no extra traffic in the network for distributing the neighbour graph will be needed. To implement this procedure, however, the network information and the relevant neighbour graph information must be available at the AAA server.
  • the method of the invention enables the transmission of context parameters from one access point through the neighbouring element to which the handover should be performed. This may improve the quality of service during the handover by making use of the shortened secure channel directly be ⁇ tween the relevant neighbouring access points without redirecting all the informa ⁇ tion through the mediation of the AAA server.
  • transmission of the context parameters may improve the handover quality by making sure that the handover of the service can be performed in a seamless manner by transferring all the relevant context information so that the communications session can be con ⁇ tinued at the new access point in the same manner as it was conducted at the pre ⁇ vious access point.
  • Fig. 1 schematically illustrates a network configuration according to the prior art.
  • Fig. 2 schematically illustrates a network configuration used in connection with an embodiment of the invention.
  • FIG. 3 schematically show a flowchart schematically illustrating an embodiment of the invention.
  • Fig. 4 schematically show a flowchart schematically illustrating a further embodi- ment of the invention.
  • Fig. 5 schematically illustrates a message sequence of an embodiment of the pres ⁇ ent invention compared to the prior art.
  • Fig. 6 schematically illustrates a message sequence of a further embodiment of the present invention.
  • Fig. 2 shows schematically a configuration of a network used in connection with an embodiment of the invention.
  • an AAA server responsi ⁇ ble for the security tasks.
  • Several access points AP1 to AP7 are shown with their respective coverage.
  • a management machine MM which has the task of generally managing the network, e.g. by maintaining a list of the network elements, managing the access and removal of network elements, and the like.
  • the management machine is aware of the network topology, i.e. knows which network elements are located at which location and which range is covered by which network element.
  • the management machine is a secure location protected by limiting access thereto by keys and/or other security measures be ⁇ cause the information about the network elements is security relevant.
  • the AAA server has (or generates on request) security related information for each network element such as keys, identities, etc..
  • security related information for each network element such as keys, identities, etc.
  • the AAA server keeps a list of network ele ⁇ ments, it keeps track which elements are trusted or not, logged-on or not, and fur ⁇ ther their shared keys and Security Association (SA).
  • SA Security Association
  • the security association here means any security relevant information necessary to establish a communications session with a network element, this may include encryption keys, integrity check keys, it may also include an identification of the encryption algorithm or a packet of authentication algorithm identification.
  • the AAA server and the man- agement machine have a or can built up a secure communication channel. This can be provided for during network deployment by suitable configuration of the AAA server and the management machine.
  • the management machine MM Since the management machine MM is aware of the topology of the network it knows for each network element which are its neighbours, or at least the manage- ment machine is capable to figure out the neighbouring elements of a certain net ⁇ work element. According to one embodiment as shown in Fig. 3 in step 300 the management machine for a certain network element determines which are the can- didates for a handover from this network element. Typically such candidates are the neighbouring elements, i.e. those network elements whose coverage lies adjacent to or overlaps with the certain network element. Then in step 310 there is created a security association between the certain network element from which the handover originates and the candidates.
  • the set of candidates for handover for a certain network element together with a corresponding security association between the certain network element and the candidates can be labelled as "neighbour graph".
  • Such a neighbour graph as de- scribed before with respect to AP3 may be performed for all network elements in a manner as described before, and then this enables a faster and more efficient han ⁇ dover from any of the network elements to another one.
  • a method for enabling a secure handover by creating a neighbour graph ac- cording to a further embodiment will be described by referring to Fig. 4.
  • the network element "wakes-up", e.g. by being switched on or by being newly added to the network, and then it logs on to the AAA server.
  • the network element Like shown in Fig. 2 also in this embodiment there is a secure channel and a "trust" between the AAA server and the management machine MM.
  • Based there- upon the network element receives a token from the AAA server to communicate with the management machine (operation 410).
  • the AAA server also sends the to ⁇ ken to the management machine (operation 420).
  • the management machine checks the location of the network element and deter ⁇ mines the candidates for a handover from the network element (operation 430). This could be only neighboring elements, like in the embodiment before. However, in a particular embodiment the candidates could also include network elements which are not direct neighbors but can only be reached through an "intermediate network element", this may be called a "multiple hop", and it may be included when determining the candidates for handover depending on the network policy and pos ⁇ sibly also on other parameters.
  • hop or “multihop” when used in the fol ⁇ lowing relates to a case where in addition to direct neighboring network elements further network elements are involved which are "neighbors of neighbors” such that a handover to such a network element would then be performed via an intermediate network element, and we in the following refer to this situation as a multiple hop. It should further be noted here that the generation of a neighbor graph may include network elements which are not direct neighbors of the originating network element.
  • the number of hops may be fixed. However, in a particular em ⁇ bodiment the number of hops could also be determined on certain parameters, e.g. the expected speed of the user and the location of the network. E.g. the network elements close to the rails of a train may often serve users moving at high speed, and then a multihop neighbor graph could be advantageous.
  • the number of hops may also depend on the coverage of the individual network element (the cell size), which itself may depend on the allowed data rates.
  • the candidate information is sent to the net ⁇ work element from which the handover should originate (operation 440).
  • the thus transmitted candidate information may comprise e.g. the ID of the candidate net- work elements, depending on availability of technology their location (which may e.g. be taken from a GPS system if the move and are not fixed), their capabilities (e.g. the available services, bandwidths, and other service related parameters) and also the number of hops from the originating network element. Most important among this information is the ID of the candidate elements.
  • the originating network element Based on the received information about the candidate network elements for a handover the originating network element send this candidate element information to the AAA server and requests a security association with them to be generated (operation 450).
  • a security association in this embodiment means e.g. encryption information such as keys related to the originating network element which then are encrypted respectively by keys belonging to respective candidate elements.
  • a secu ⁇ rity association for e.g. between AP3 and AP4 with AP3 as originating network ele- ment may therefore consist in security relevant information belonging to AP3 (keys, encryption algorithms, and possibly authentication algorithms like e.g. hashing algo ⁇ rithms) which has been encrypted by a key or keys belonging to AP4.
  • the thus en ⁇ crypted information then forms a "security association" between AP3 and AP4.
  • Such security associations are generated for all pairs between the originating net- work element and the candidate elements.
  • a security association may be regarded as the relationship between two or more entities (typically a computer, but it could also be a user or a software com ⁇ ponent) which describes how the entities will use security services such as encryp- tion to communicate.
  • the network element sends the SAs, encrypted by individual candidate net ⁇ work element keys (carried out by AAA server), to the candidate network elements (operation 470).
  • This can be a multicast or unicast (i. e. all security associations together are transmitted as a single large security association message, to each network element, however would be time consuming).
  • Each network element can decrypt its SA or its portion thereof.
  • each candidate element is now aware of the security relevant information(such as the keying materials, en ⁇ cryption algorithm, authentication algorithm like hash-algorithms, and the like) of the originating network element and vice versa, and this enables now the perform- ing of a secure (direct) handover from the originating network element to any of the candidate elements based on the thus created "neighbor graph" without having to re-authenticate the mobile terminal at the AAA server.
  • security relevant information such as the keying materials, en ⁇ cryption algorithm, authentication algorithm like hash-algorithms, and the like
  • the keying materials related to the originating network element are encrypted by the keying materials of a certain candidate network element and then forwarded to said candidate network element.
  • the candidate network element can decrypt them by using its own keying elements for decryption and thereby receives the keying elements or security information necessary to communicate with the originating network element.
  • the originating network element receives the keying materials of the candidate element. For security reasons these keying elements before being transmitted to the originating network element are encrypted using the keying materials belonging to said originating network element.
  • the origi ⁇ nating network element then can decrypt them using its own keying materials which it has been provided when logging on to the network.
  • the message sent to the originating network element may look like as follows:
  • Such message parts are generated and transmitted to the originating network element for each pair consisting between the originating network element and the respective n candidate elements, therefore the whole message contains n such message elements as shown above.
  • the keying materials typically are generated using a security server or any unit which is trusted and dedicated to the generation and maintenance of keying materi ⁇ als and possibly other security relevant information.
  • the security server may e.g. be an AAA server.
  • the originating network element may be allowed to perform the encryption of the above message by itself so that only the keying materials Key ca n d are delivered to the originating network element. It may then perform the encryption by itself to obtain ((C cand (Key or ig), however, according to another embodiment the encryption is performed in a separate unit such as in the AAA server.
  • the neighbor graph has been completed for the originating network element. It will be understood that preferably for all network elements a neighbor graph is generated in the manner described before.
  • the above procedure to create a secure neighbor graph may be repeated in prede ⁇ fined intervals. This may enable an update of the neighbor graph in case of new network elements have been added to the network.
  • the neighbor graph may be re-generated in case a new network element is added to the network. Such an addition will be noted by the management machine which may then be configured to trigger the re-generation of the neighbor graph in such a case.
  • the management machine which may then be configured to trigger the re-generation of the neighbor graph in such a case.
  • a network element remains idle for a certain predetermined time period which may be set as a net ⁇ work parameter it may be removed from the neighbor graph.
  • some embodiments are described which focus on variations how the neighbor graph, is transferred to its target, namely the originating network ele ⁇ ment for which the neighbor graph should enable communication with its corre ⁇ sponding candidate elements for handover.
  • AAA server has the network configuration informa ⁇ tion and sends a neighbor graph (or the list of candidate elements for a handover) to a new network element on log-on of the new network element. This avoids then the need for a management machine, however, it means that the AAA server must be configured to be aware of the network topology and it must further be configured to be.able to determine the candidate elements for handover which, correspond to a certain originating network element.
  • the AAA server communicates with the man- agement server on log-on of a network element and sends the candidate elements to the AAA server. This corresponds to the embodiment described in very detail already before.
  • the AAA server sends respective tokens with SA (security association) information to the originating network element and the management machine.
  • SA security association
  • the distribution of the tokens may consist in keying elements so that the management machine and the originating network can communicate directly in a secure manner, in other words trust has been established between them.
  • the originating network element can then communicate with the management machine and get the set of candidate elements for the handover.
  • the creation of the neighbor graph may then proceed as already described in detail before.
  • the generation of the neighbor graph may be per ⁇ formed as follows. On request by a network element (e.g. when logging on) the list of candidate elements is determined, either by the management machine of directly by the AAA server. The AAA server then based on the set of candidate elements creates security associations for each of the candidate elements comprising the keying materials of the originating network element and the respective candidate element. The respective security associations are then directly sent from the AAA server to the respective candidate elements to thereby enabling communication between the candidate elements and the originating network element, respectively.
  • the network element ID used as log-on This information is enough for fixed network, because in case of a fixed network (where no network element moves) this information is sufficiently to determine the neighboring network elements
  • the network element location is needed when the network element can be mo ⁇ bile and may move.
  • the man- agement machine determines the neighbor elements based on the network con ⁇ figuration. For that purpose there are different methods that can be used depending on the embodiment.
  • the management machine simply checks the ID of the network element and finds its location in the network configuration which it maintains. It then sends the ID of all the network elements in the neighborhood till the number of hops defined by the network policy.
  • the management machine checks the network elements available in the neighborhood as mentioned before. However, in this em ⁇ bodiment it also checks if there are walls or other materials that might distort the signal; thus the mobile device will not be able to handover to such network ele- ments. Based on such external influences it then determines the ID of network ele ⁇ ments that can be practically used for handover as neighbor graph. In this embodi ⁇ ment also the number of hops according to the network policy is checked and the candidate elements are determined accordingly.
  • the candidate elements are determined similar to any of the previous two methods, however in this embodiment the num ⁇ ber hops is dependent on the direction of the mobile terminal or the network ele ⁇ ment. If the direction is towards the inside of a building then it can be assumed that the user will walk and only one hop information is enough because the speed of the user doesn't make more than one hop necessary. However, if the direction of the mobile terminal or the network element is towards the street then it is possible that the user is driving and in this embodiment the candidate elements then are deter ⁇ mined such that multiple hops are included.
  • the number of hops may also be determined depending on the location of the user or the network element and possibly based on the environ ⁇ mental conditions at such a location. If e.g. the location is close to a train rail, then the user may have entered a train and possibly may move fast so that multihops could be preferable and should be included into the candidate elements. The details about how many hops should be selected depending on which environmental con ⁇ dition may be chosen appropriately when defining the network parameters.
  • the network element has the ability to find its location (e.g. GPS based), and then it sends its ID and coordinates e.g. to the man- agement machine. This is particularly useful for situations where the topology can change, i.e. if the network element itself (and not only the user with his mobile de ⁇ vice) can move.
  • the management machine determines the IDs and coordi ⁇ nates of neighboring network elements based on the location of the originating net ⁇ work element. This includes the determination of candidates up to the number of hops defined by the network policy and possibly also based on the direction of the movement.
  • an improved determination can be made if the management machine has site survey information. Site survey information may e.g.
  • Geographical information may e.g. in ⁇ clude information indicating which network elements will make no sense to use as handover candidate. This may take into account environmental influences which can be determined based on said geographical information and which may affect the possibility or the likelihood that a handover is performed to a certain candidate element.
  • the position information of a user indicates that he is located most likely in a train because his position coincides with the location of the rails of a train, then it makes no sense to include such candidate elements which are neighboring elements of the originating elements but which do not cover the geographical area in which the rails are located and hence the train and the user will move.
  • each network element on change of loca ⁇ tion sends its new coordinates to the management server.
  • a new neighbor graph is generated.
  • the management machine or the unit responsible for determin ⁇ ing the candidate elements will perform a significance check in order to check whether the movement is so significant that a new neighbor graph should be gen ⁇ erated. If e.g. the location change means that the set of neighboring network ele- ments has changed then in one embodiment this could be regarded as significant enough to create a new neighbor graph.
  • the move ⁇ ment does not lead to a change in the set of neighboring elements in one embodi ⁇ ment it may be determined that the movement is not so significant that a new neighbor graph need to be generated.
  • the invention can be applied to mesh networks, e.g. to fixed wireless mesh network.
  • a wireless mesh network with no change in topology.
  • the methods described before can be used for cheap de ⁇ ployment or extension of networks.
  • a new network element is to be added to a LAN, then it is added at first by the network administrator to the network. There- after when it logs on to the network it may trigger the (re-) creation of a neighbor graph in on of the manners as described before. Because the network topology will not change in time no adjustments of the neighbor graph due to network element location changes are necessary.
  • the network elements preferably inform the management machine or the unit responsible for the determination of the can ⁇ didate elements about their location every time they move. In one such embodiment each movement will mean a new neighbor graph. In this case the network element can send the location information together with a neighbor graph request.
  • the thus created secure communications channel may be used for the transmission of context pa ⁇ rameters from one access point through the neighbouring network element (access point) to which the handover should be performed. This may improve the quality of service during the handover by making use of the shortened secure channel directly between the relevant neighbouring access points without redirecting all the infor ⁇ mation through the mediation of the AAA server.
  • transmission of the context parameters may improve the handover quality by making sure that the handover of the service can be performed in a seamless manner by transferring all the relevant context information so that the communications session can be continued at the new access point in the same manner as it was conducted at the previous access point.
  • the context information being transferred may involve information about the quality of service or the available services such as the bandwidth or data rate, and then the communications session after handover may be continued in an appropriate manner based on these context parameters.
  • FIG. 5 on the left- hand side shows a message sequence for a handover procedure in a wireless LAN system according to the standard IEEE 802.11.
  • a station STA which has been connected to an old access point AP and which now is about to perform a handover to a new access point APnew.
  • probe requests and responses in three different channels by the station STA. While the standard itself does not require three channels it should be mentioned here that a good implementation will use three channels. This is for just looking around which new access point might be suitable or available for handover.
  • the station STA sends around these requests in three channels different from the channel of the ongoing present communication. Any access point ready for handover sends a corre ⁇ sponding response, as illustrated in the sequence diagram.
  • an open sys ⁇ tem authentication which is also a term according to the standard IEEE 802.11.
  • This open system authentication just means that the station exchanges a message with the new access point.
  • This open system of authentication does not yet involve any security parameters, it is not a "real authentication" in the sense that any se- cure transmission or security check is involved in this authentication, it is therefore labeled "open system authentication”.
  • the station STA associates itself with the new access point.
  • the new access point Apnew.
  • the old access point contacts the AAA server to perform an authentication procedure to create a trust relationship between the old and the new access point.
  • the old access point returns a message to the new access point to complete the establishment of a trust relationship between the two access points and to fi ⁇ nally agree that the new access point will take over thejnobile station.
  • This proce ⁇ dure including the then two following steps which will be explained later is a so- called IAPP move producer between the old access point and the new access point.
  • the exchange of these messages according to the inter-access point proto- col (IAPP) move procedure has the purpose of first of all informing the old access point AP that the new access point APnew will now take over the mobile station STA and to perform an authentication (the first to fourth messages in the IAPP move procedure).
  • the fifth and sixth messages may be used for the transfer of context information, for example context information related to the services and the features of the ongoing communications session.
  • EAP-TLS extensible authentication protocol
  • TLS transport layer security
  • the message sequences shown with respect to this authentication in the diagram follow the prescriptions of the standard IEEE 802.11 i. As can be seen from the diagram this involves the exchange of a large number of messages, moreover, it involves two stages of message exchanges, namely from the station STA to the new access point APnew, from there to the AAA server, and back via the new access point to the station STA. All the messages together form the handover delay as indicated in the message sequence diagram of the left-hand side of Fig. 5, and the messages from the open system authentication to the EAP-TLS authentication form the re- authentication delay involved with the re-authentication of the station at the new access point APnew.
  • the probe request and response there is the same as in the diagram on the left-hand side of Fig. 5.
  • the open system authentication after the probe request and response also is the same as in the left-hand side of Fig. 5.
  • sequences involved with the re-association are in principle the same as in the left-hand side message sequence diagram.
  • the transmis ⁇ sion of context parameters in this embodiment may involve the transmission of a security context, such as e.g. the key(s) and possibly other security related information such as an encryption algorithm, and/or an authentication algorithm like a hash-algorithm, necessary for the new access point to communicate with station STA.
  • the authentication server AAA is not involved in this authentication procedure because all relevant security information has already in advance been delivered to the communication partners.
  • the re-authentication delay and thereby the handover delay is sig- nificantly reduced in an embodiment according to the present invention when com ⁇ pared with the prior art as shown on the left-hand side of Fig. 5.
  • Fig. 6 on the left- hand side shows a message sequence diagram which is identical to the one on the right-hand side of Fig. 5.
  • the last two messages which are used for the transfer of context information may involve the transfer of the security context, i.e. the exchange of the relevant keys between the communications partners so that the station STA is en- abled to communicate with the new access point APnew.
  • the security context i.e. the exchange of the relevant keys between the communications partners so that the station STA is en- abled to communicate with the new access point APnew.
  • the IAPP move procedure involves only the exchange of two messages in order to inform the old access point AP that the new access point APnew is to take over the communications session with the station STA.
  • these two messages can be exchanged simultaneously (not in sequence) because a security association has been already generated be ⁇ tween the old access point AP and the new access point APnew.
  • the actual authentication of the station STA at the new access point APnew may be performed as already explained in connection with the diagram shown on the left-hand side of Fig. 6.
  • the total handover delay can be further decreased compared with the procedure of a handover according to the prior art.
  • this security association is for example trans ⁇ ferred by the fifth and sixth messages in the IAPP move procedure of the right hand side of Fig. 5 and the left hand side of Fig. 6.
  • a certain access point which acts as an originating access point and for which the neighbor graph is generated not only determines the candidate elements based on which then the security context transfer between the originating access point and the candidate elements is per- formed, but also determines which mobile stations are served by this originating access point. For the mobile stations located and being served through the cover ⁇ age area of this originating access point the security associations between these mobile stations and the originating access point are also transferred to the candi ⁇ date elements to enable the fast handover as described before.
  • the originating access point therefore transfers the security context or the security association to its neighboring candidate elements based on the individual mobile stations located in its coverage area.
  • this access point updates the neighbor graph by trans ⁇ ferring the security association established between this new mobile station and the originating access point also to the other candidate elements included in the neigh ⁇ bor graph to enable the fast handover for this mobile station from the originating access point to one of the candidate elements after the new mobile station has en- tered the area of the originating access point.
  • This may be regarded as an update of the neighbor graph.
  • the updating of the neighbor graph therefore involves the transfer of security asso ⁇ ciations between mobile stations and the originating access point. It may be trig ⁇ gered by the entering of a mobile station into the coverage area of a certain access point which then forms the originating access point for this newly entered mobile station and which therefore has to update its neighbor graph.
  • the updating of the neighbor graph may be de ⁇ pendent on the result of a status polling through which a certain access point checks by a polling which mobile stations are located in its coverage area.
  • a polling may be performed at predefined moments in time or at predefined intervals.
  • the updating of a neighbor graph may also be based on a mobile station leaving the coverage area of a certain originating access point. After the mobile station has left the coverage area of the originating access point this originating access point may inform the candidate elements included in its neighbor graph about the leaving of this mobile station and about the fact that these candidate elements may delete their security associations related to this mobile station which just has left. In this manner an overflow or an over-accumulation of security associations which actually are not in use anymore at the different access point can be avoided.
  • the neigh ⁇ bor graph is re-generated or updated at the access point into the coverage area of which the mobile station has moved. This avoids that the security association for this mobile station is deleted from such access points to which the mobile station actually could possibly hand over even after having moved into the new coverage area.
  • the neighbor graph created for the certain access point may depend also on the individual pa ⁇ rameters or character of the mobile stations located in the coverage area of this access point. If for example in the coverage area of this access point there is lo- cated one mobile station which may move relatively fast such that it requires a multi-hop neighbor graph, then due to this fact the neighbor graph for this originat ⁇ ing access point may involve multi-hop candidate elements. Once this mobile sta ⁇ tion leaves the coverage area of this originating access point, however, the candi- date elements which are included due to the multi-hop requirement may be can ⁇ celled from the neighbor graph of this originating access point.
  • the individual candidate elements included in the neighbor graph of a certain originating access point may have corresponding identifiers which identify based on which mobile station they are included in the neighbor graph.
  • a certain candidate element may be included into the neighbor graph due to a first slowly moving mobile station and also due to a fast moving mobile station, in this case it will have two corresponding identifiers identifying these two mobile stations. If the fast moving mobile station leaves the coverage area, this candidate element will still be included in the neighbor graph because it is also included due to another mobile station.
  • those candidate elements which are included into the neighbor graph only due to the fast moving mobile station may then by removed from the neighbor graph once this fast moving mobile station has left the coverage area of the originating access point.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

A method for supporting a secure handover of a mobile terminal from a first network element to another network element, said method comprising: automatically determining based on the topology of said network for said first network element candidate network elements which can be expected to act as candidates for the handover from said first network element; generating a security association between said candidate network elements and said first network element to support a handover based on said security associa­tion.

Description

DCE 016 WO
METHOD AND APPARATUS FOR SUPPORTING SECURE HANDOVER
FIELD OF THE INVENTION
The present invention relates to a method and an apparatus for secure handover, and in particular it relates to the selection of handover candidates based on the network topology and the creation of trust with these candidates.
BACKGROUND OF THE INVENTION
In our days more and more communications links are implemented through wireless networks. Such wireless networks may comprise mobile phone communications networks, typically also referred to as so-called cellular networks, wireless computer networks such as wireless LANs, or hybrid networks which include a variety of dif¬ ferent network technologies and corresponding terminals.
A typical property of wireless networks consists in the fact that usually they are or¬ ganised in cells which means that terminals can access to the network through so- called access points which serve a certain range or area surrounding them. The communication between individual terminals which are not located in the same cell then is realised either through some backbone network which receives the informa- tion from the access point and delivers it to another access point close to the termi¬ nal device which is the intended recipient of the information, or the information may be transmitted from access point to access point until the access point is reached in the range of which the intended recipient terminal is located.
The great advantage of such types of network is that the user of a terminal device (a mobile phone, a PDA, a portable computer, or the like) may move while main¬ taining a communications link with another user through the network. However, one of the problems arising with these types of networks is that the user may move out of the range of a certain cell, and then there must be provided some mechanism which still maintains the communications link despite the user and his terminal have moved out of the range of its access point or base station.
In order to maintain communications while moving out of the range of a certain cell the terminal must then make access and maintain the communications link through another cell the range of which covers the user's location after having moved. Such a procedure typically is labelled "handover". In order to perform a handover ac- cording to the conventional procedure there must be carried out an authentication and authorisation of the mobile terminal with respect to the new access point or base station. This is now schematically illustrated by referring to Fig. 1.
Fig. 1 shows a first access point AP1 having a certain range 100 within which it can communicate with mobile terminals, a mobile terminal MT1 located in this range, and moving to the coverage range 110 of another access point AP2. In order to prevent unauthorised access to the network and to ensure proper controlling of ac¬ cess and accounting and building of any services rendered by the network some kind of authentication and authorisation as well as accounting must be performed. Typically this kind of task is performed by an authentication, authorisation and ac¬ counting (AAA) server as shown in Fig. 1. The AAA server is in charge of perform¬ ing authentication and authorisation checks when a terminal wishes to access a network, it typically is responsible for the general security environment like the gen¬ eration and distribution of keys for communication sessions, the accounting of services rendered, and the like.
When a mobile terminal MT1 accesses the network through for example access point AP1 , then AP1 contacts the AAA server in order to at first identify and authen¬ ticate the mobile terminal MT1 and then to negotiate some security environment such as encryption keys used during the communications session. When mobile terminal MT1 moves then to the range 110 of access point AP2, the same authenti¬ cation and authorisation procedure has to be performed with respect to the new access point AP2 by contacting the AAA server through access point AP2 to per¬ form the authentication and authorisation.
This procedure is time consuming because for each secure handover the AAA server has to be contacted and a new security environment (which may also be la¬ belled "security context" or "security association") has to be created by first check¬ ing the authentication and then negotiating a new security environment in a new cell.
Based on the foregoing it is an object of the present invention to provide a more efficient technique for performing a secure handover.
SUMMARY OF THE INVENTION
According to one aspect of the present invention there is provided a method for supporting a secure handover which employs the creation of a trust relation be¬ tween neighbouring network elements to which the mobile device can handover. Once such a trust relationship has been created between neighbouring network elements such as access points, the handover can be performed in a faster and more efficient way by avoiding the need to re-authenticate the mobile device through contacting the AAA server.
According to one aspect the method includes the generation of a neighbour graph which is a data set which includes an identification of those neighbouring network elements (access points) to which a handover could be performed, as well as a se¬ curity context, security association or security information which enables the direct handover without re-contacting the AAA server between neighbouring network ele¬ ments.
According to one embodiment the neighbouring graph contains a list or set of the IDs of the access points to which a handover is possible, and a set of keys for the communication between the neighbouring access points or base stations. Such keys may for example be encryption keys, integrity check keys, it may also include an identification of the encryption algorithm or a packet of authentication algorithm identification.
With such a neighbouring graph there is provided the necessary information in or¬ der to make possible a fast handover to those neighbouring networking elements which could possibly be the target of a handover.
According to one embodiment the generation of the neighbouring graph includes the selection or identification of those neighbouring networking elements which are candidates for a handover. In order, to make such.an identification or selection ref¬ erence could be made to the network topology which may for example be stored in a management machine which maintains a description of the network topology.
According to one embodiment the method for supporting a the secure handover includes the transmission of the security context which has been generated for the neighbouring elements included in the neighbour graph to the candidate elements from the originating network element from which the handover should originate.
According to one embodiment the neighbour graph information including the candi¬ dates for handover and the corresponding security context can be transmitted to a network element as "piggyback" when it logs on to an AAA server. This means that no extra traffic in the network for distributing the neighbour graph will be needed. To implement this procedure, however, the network information and the relevant neighbour graph information must be available at the AAA server.
According to one embodiment the method of the invention enables the transmission of context parameters from one access point through the neighbouring element to which the handover should be performed. This may improve the quality of service during the handover by making use of the shortened secure channel directly be¬ tween the relevant neighbouring access points without redirecting all the informa¬ tion through the mediation of the AAA server. Moreover, transmission of the context parameters (which may be any parameters related to the user situation or the situa¬ tion of the communication itself, such as location, used service, service configura¬ tion, or other parameters) may improve the handover quality by making sure that the handover of the service can be performed in a seamless manner by transferring all the relevant context information so that the communications session can be con¬ tinued at the new access point in the same manner as it was conducted at the pre¬ vious access point.
DESCRIPTION OF THE DRAWINGS
Fig. 1, schematically illustrates a network configuration according to the prior art.
Fig. 2 schematically illustrates a network configuration used in connection with an embodiment of the invention.
Fig. 3 schematically show a flowchart schematically illustrating an embodiment of the invention.
Fig. 4 schematically show a flowchart schematically illustrating a further embodi- ment of the invention.
Fig. 5 schematically illustrates a message sequence of an embodiment of the pres¬ ent invention compared to the prior art.
Fig. 6 schematically illustrates a message sequence of a further embodiment of the present invention. DETAILED DESCRIPTION
Fig. 2 shows schematically a configuration of a network used in connection with an embodiment of the invention. Like in Fig. 1 there is shown an AAA server responsi¬ ble for the security tasks. Several access points AP1 to AP7 are shown with their respective coverage. Furthermore there is shown a management machine MM which has the task of generally managing the network, e.g. by maintaining a list of the network elements, managing the access and removal of network elements, and the like. The management machine is aware of the network topology, i.e. knows which network elements are located at which location and which range is covered by which network element. Typically the management machine is a secure location protected by limiting access thereto by keys and/or other security measures be¬ cause the information about the network elements is security relevant.
The AAA server has (or generates on request) security related information for each network element such as keys, identities, etc.. When a network element switches on, it has to log-on to the AAA server. The AAA server keeps a list of network ele¬ ments, it keeps track which elements are trusted or not, logged-on or not, and fur¬ ther their shared keys and Security Association (SA).The security association here means any security relevant information necessary to establish a communications session with a network element, this may include encryption keys, integrity check keys, it may also include an identification of the encryption algorithm or a packet of authentication algorithm identification.
In case of the present embodiment it is assumed that the AAA server and the man- agement machine have a or can built up a secure communication channel. This can be provided for during network deployment by suitable configuration of the AAA server and the management machine.
In the following it will now be described how using the system of Fig. 2 a method for enabling a secure handover according to an embodiment of the invention is per¬ formed.
Since the management machine MM is aware of the topology of the network it knows for each network element which are its neighbours, or at least the manage- ment machine is capable to figure out the neighbouring elements of a certain net¬ work element. According to one embodiment as shown in Fig. 3 in step 300 the management machine for a certain network element determines which are the can- didates for a handover from this network element. Typically such candidates are the neighbouring elements, i.e. those network elements whose coverage lies adjacent to or overlaps with the certain network element. Then in step 310 there is created a security association between the certain network element from which the handover originates and the candidates.
In case of a network configuration as shown in Fig. 2 this could mean that for net¬ work element AP3 as the originating element network elements AP1 , AP2, AP4, and AP6, are included in the set of candidates. Then a security association is gen- erated between AP3 and the candidates AP1 , AP2, AP4, and AP6. This means that after the security association having been generated a handover from AP3 to any of. the candidates AP1 , AP2, AP4, and AP6 has been enabled and may be performed without re-authenticating the mobile device at the AAA server because the security association which has been generated between AP3 and the candidates can be used when handing over the mobile device to any of the candidates.
The set of candidates for handover for a certain network element together with a corresponding security association between the certain network element and the candidates can be labelled as "neighbour graph". Such a neighbour graph as de- scribed before with respect to AP3 may be performed for all network elements in a manner as described before, and then this enables a faster and more efficient han¬ dover from any of the network elements to another one.
Now a method for enabling a secure handover by creating a neighbour graph ac- cording to a further embodiment will be described by referring to Fig. 4. In this em¬ bodiment at first in operation 400 the network element "wakes-up", e.g. by being switched on or by being newly added to the network, and then it logs on to the AAA server. Like shown in Fig. 2 also in this embodiment there is a secure channel and a "trust" between the AAA server and the management machine MM. Based there- upon the network element receives a token from the AAA server to communicate with the management machine (operation 410). The AAA server also sends the to¬ ken to the management machine (operation 420). The management machine checks the location of the network element and deter¬ mines the candidates for a handover from the network element (operation 430). This could be only neighboring elements, like in the embodiment before. However, in a particular embodiment the candidates could also include network elements which are not direct neighbors but can only be reached through an "intermediate network element", this may be called a "multiple hop", and it may be included when determining the candidates for handover depending on the network policy and pos¬ sibly also on other parameters. It should be understood here that the term "hop" or "multihop" when used in the fol¬ lowing relates to a case where in addition to direct neighboring network elements further network elements are involved which are "neighbors of neighbors" such that a handover to such a network element would then be performed via an intermediate network element, and we in the following refer to this situation as a multiple hop. It should further be noted here that the generation of a neighbor graph may include network elements which are not direct neighbors of the originating network element.
In one embodiment the number of hops may be fixed. However, in a particular em¬ bodiment the number of hops could also be determined on certain parameters, e.g. the expected speed of the user and the location of the network. E.g. the network elements close to the rails of a train may often serve users moving at high speed, and then a multihop neighbor graph could be advantageous. The number of hops may also depend on the coverage of the individual network element (the cell size), which itself may depend on the allowed data rates.
After the candidate elements for a handover from a certain network element have been determined this information (the "candidate information") is sent to the net¬ work element from which the handover should originate (operation 440). The thus transmitted candidate information may comprise e.g. the ID of the candidate net- work elements, depending on availability of technology their location (which may e.g. be taken from a GPS system if the move and are not fixed), their capabilities (e.g. the available services, bandwidths, and other service related parameters) and also the number of hops from the originating network element. Most important among this information is the ID of the candidate elements.
Based on the received information about the candidate network elements for a handover the originating network element send this candidate element information to the AAA server and requests a security association with them to be generated (operation 450).
The AAA server then generates (or retrieves if already generated) the security as- sociations and transmits them to the network element from which the handover should originate. A security association in this embodiment means e.g. encryption information such as keys related to the originating network element which then are encrypted respectively by keys belonging to respective candidate elements. A secu¬ rity association for e.g. between AP3 and AP4 with AP3 as originating network ele- ment may therefore consist in security relevant information belonging to AP3 (keys, encryption algorithms, and possibly authentication algorithms like e.g. hashing algo¬ rithms) which has been encrypted by a key or keys belonging to AP4. The thus en¬ crypted information then forms a "security association" between AP3 and AP4. Such security associations are generated for all pairs between the originating net- work element and the candidate elements.
In general a security association may be regarded as the relationship between two or more entities (typically a computer, but it could also be a user or a software com¬ ponent) which describes how the entities will use security services such as encryp- tion to communicate.
Then the network element sends the SAs, encrypted by individual candidate net¬ work element keys (carried out by AAA server), to the candidate network elements (operation 470). This can be a multicast or unicast (i. e. all security associations together are transmitted as a single large security association message, to each network element, however would be time consuming). Each network element can decrypt its SA or its portion thereof. This means that each candidate element is now aware of the security relevant information(such as the keying materials, en¬ cryption algorithm, authentication algorithm like hash-algorithms, and the like) of the originating network element and vice versa, and this enables now the perform- ing of a secure (direct) handover from the originating network element to any of the candidate elements based on the thus created "neighbor graph" without having to re-authenticate the mobile terminal at the AAA server.
In other words, the keying materials related to the originating network element are encrypted by the keying materials of a certain candidate network element and then forwarded to said candidate network element. The candidate network element can decrypt them by using its own keying elements for decryption and thereby receives the keying elements or security information necessary to communicate with the originating network element. Furthermore the originating network element receives the keying materials of the candidate element. For security reasons these keying elements before being transmitted to the originating network element are encrypted using the keying materials belonging to said originating network element. The origi¬ nating network element then can decrypt them using its own keying materials which it has been provided when logging on to the network.
Therefore, in one embodiment the message sent to the originating network element may look like as follows:
((Ccand (KeyOrig); COrig(KeyCancl))i=1> > (Ccand (Keyorig); Corig(Keycand))i=n)
The message part ((Ccand (Keyorig); COrig(KeyCand))i=i here means the keying elements Keyorig of the originating network element encrypted by an encryption algorithm Ccand using the keying elements of candidate element i=1 , and the keying materials Keycandfor candidate network element i=1 are encrypted using the keying materials Corig of the originating network element. Such message parts are generated and transmitted to the originating network element for each pair consisting between the originating network element and the respective n candidate elements, therefore the whole message contains n such message elements as shown above.
The keying materials typically are generated using a security server or any unit which is trusted and dedicated to the generation and maintenance of keying materi¬ als and possibly other security relevant information. The security server may e.g. be an AAA server.
Depending on the level of trust which the originating network element enjoys it may be allowed to perform the encryption of the above message by itself so that only the keying materials Keycand are delivered to the originating network element. It may then perform the encryption by itself to obtain ((Ccand (Keyorig), however, according to another embodiment the encryption is performed in a separate unit such as in the AAA server.
Once each of the candidate elements has received the security association which enables it to communicate with the originating network element the neighbor graph has been completed for the originating network element. It will be understood that preferably for all network elements a neighbor graph is generated in the manner described before.
The above procedure to create a secure neighbor graph may be repeated in prede¬ fined intervals. This may enable an update of the neighbor graph in case of new network elements have been added to the network.
As an alternative or additionally the neighbor graph may be re-generated in case a new network element is added to the network. Such an addition will be noted by the management machine which may then be configured to trigger the re-generation of the neighbor graph in such a case. On the other hand, in case a network element remains idle for a certain predetermined time period which may be set as a net¬ work parameter it may be removed from the neighbor graph. In the following some embodiments are described which focus on variations how the neighbor graph, is transferred to its target, namely the originating network ele¬ ment for which the neighbor graph should enable communication with its corre¬ sponding candidate elements for handover.
According to one embodiment AAA server has the network configuration informa¬ tion and sends a neighbor graph (or the list of candidate elements for a handover) to a new network element on log-on of the new network element. This avoids then the need for a management machine, however, it means that the AAA server must be configured to be aware of the network topology and it must further be configured to be.able to determine the candidate elements for handover which, correspond to a certain originating network element.
According to one further embodiment the AAA server communicates with the man- agement server on log-on of a network element and sends the candidate elements to the AAA server. This corresponds to the embodiment described in very detail already before.
According to one further embodiment the AAA server sends respective tokens with SA (security association) information to the originating network element and the management machine. This is possible under the condition that there exists trust between the AAA server and the management machine as well as between the AAA server and the originating network element, respectively. The distribution of the tokens may consist in keying elements so that the management machine and the originating network can communicate directly in a secure manner, in other words trust has been established between them. The originating network element can then communicate with the management machine and get the set of candidate elements for the handover. The creation of the neighbor graph may then proceed as already described in detail before.
According to one embodiment the generation of the neighbor graph may be per¬ formed as follows. On request by a network element (e.g. when logging on) the list of candidate elements is determined, either by the management machine of directly by the AAA server. The AAA server then based on the set of candidate elements creates security associations for each of the candidate elements comprising the keying materials of the originating network element and the respective candidate element. The respective security associations are then directly sent from the AAA server to the respective candidate elements to thereby enabling communication between the candidate elements and the originating network element, respectively.
In the following it will be described in somewhat more detail how the candidate ele- ments for a handover are determined.
In order to determine the candidate elements the following information is needed:
• The network element ID used as log-on. This information is enough for fixed network, because in case of a fixed network (where no network element moves) this information is sufficiently to determine the neighboring network elements
• The network element location is needed when the network element can be mo¬ bile and may move.
Once the network element ID is received by the management machine, the man- agement machine determines the neighbor elements based on the network con¬ figuration. For that purpose there are different methods that can be used depending on the embodiment.
According to one embodiment the management machine simply checks the ID of the network element and finds its location in the network configuration which it maintains. It then sends the ID of all the network elements in the neighborhood till the number of hops defined by the network policy.
According to a further embodiment the management machine checks the network elements available in the neighborhood as mentioned before. However, in this em¬ bodiment it also checks if there are walls or other materials that might distort the signal; thus the mobile device will not be able to handover to such network ele- ments. Based on such external influences it then determines the ID of network ele¬ ments that can be practically used for handover as neighbor graph. In this embodi¬ ment also the number of hops according to the network policy is checked and the candidate elements are determined accordingly.
According to an even further embodiment the candidate elements are determined similar to any of the previous two methods, however in this embodiment the num¬ ber hops is dependent on the direction of the mobile terminal or the network ele¬ ment. If the direction is towards the inside of a building then it can be assumed that the user will walk and only one hop information is enough because the speed of the user doesn't make more than one hop necessary. However, if the direction of the mobile terminal or the network element is towards the street then it is possible that the user is driving and in this embodiment the candidate elements then are deter¬ mined such that multiple hops are included. Alternatively to or in addition to the di- rection of movement the number of hops may also be determined depending on the location of the user or the network element and possibly based on the environ¬ mental conditions at such a location. If e.g. the location is close to a train rail, then the user may have entered a train and possibly may move fast so that multihops could be preferable and should be included into the candidate elements. The details about how many hops should be selected depending on which environmental con¬ dition may be chosen appropriately when defining the network parameters.
According to a further embodiment the network element has the ability to find its location (e.g. GPS based), and then it sends its ID and coordinates e.g. to the man- agement machine. This is particularly useful for situations where the topology can change, i.e. if the network element itself (and not only the user with his mobile de¬ vice) can move. The management machine then determines the IDs and coordi¬ nates of neighboring network elements based on the location of the originating net¬ work element. This includes the determination of candidates up to the number of hops defined by the network policy and possibly also based on the direction of the movement. According to a further embodiment an improved determination can be made if the management machine has site survey information. Site survey information may e.g. include information how the signal strength looks like if a network element is placed in a given location. Alternatively or additionally a determination can be made based on geographical information. Geographical information may e.g. in¬ clude information indicating which network elements will make no sense to use as handover candidate. This may take into account environmental influences which can be determined based on said geographical information and which may affect the possibility or the likelihood that a handover is performed to a certain candidate element. E.g. if the position information of a user indicates that he is located most likely in a train because his position coincides with the location of the rails of a train, then it makes no sense to include such candidate elements which are neighboring elements of the originating elements but which do not cover the geographical area in which the rails are located and hence the train and the user will move. However, in such a condition it may be useful to increase the number of hops in the direction of the rails because the train may move fast and therefore a fast sequence of han¬ dovers may be required.
In the foregoing embodiment preferably each network element on change of loca¬ tion sends its new coordinates to the management server. In case of a location change then preferably a new neighbor graph is generated. Alternatively based on the location change the management machine or the unit responsible for determin¬ ing the candidate elements will perform a significance check in order to check whether the movement is so significant that a new neighbor graph should be gen¬ erated. If e.g. the location change means that the set of neighboring network ele- ments has changed then in one embodiment this could be regarded as significant enough to create a new neighbor graph. On the other hand, as long as the move¬ ment does not lead to a change in the set of neighboring elements in one embodi¬ ment it may be determined that the movement is not so significant that a new neighbor graph need to be generated.
According to one embodiment the invention can be applied to mesh networks, e.g. to fixed wireless mesh network. By this there is meant a wireless mesh network with no change in topology. The methods described before can be used for cheap de¬ ployment or extension of networks. E.g. if a new network element is to be added to a LAN, then it is added at first by the network administrator to the network. There- after when it logs on to the network it may trigger the (re-) creation of a neighbor graph in on of the manners as described before. Because the network topology will not change in time no adjustments of the neighbor graph due to network element location changes are necessary.
In case of a wireless mesh network which may be subject to topology change the situation is somewhat different. A change in topology makes the system slightly more complex because in such case the location information becomes necessary. Location information can e.g. be found by using GPS or other positioning technolo¬ gies that are available. In this embodiment the network elements preferably inform the management machine or the unit responsible for the determination of the can¬ didate elements about their location every time they move. In one such embodiment each movement will mean a new neighbor graph. In this case the network element can send the location information together with a neighbor graph request. In one particular embodiment there may be provided a unit for checking whether the movement is significant enough to make a creation of a new neighbor graph neces¬ sary. This unit can be implemented in the management machine, in the AAA server, or even in the network element itself.
According to the embodiments described hereinbefore there is created a neighbor graph which enables a secure communication between a first network element and candidate elements for a handover. According to one embodiment the thus created secure communications channel may be used for the transmission of context pa¬ rameters from one access point through the neighbouring network element (access point) to which the handover should be performed. This may improve the quality of service during the handover by making use of the shortened secure channel directly between the relevant neighbouring access points without redirecting all the infor¬ mation through the mediation of the AAA server. Moreover, transmission of the context parameters (which may be any parameters related to the user situation or the situation of the communication itself, such as location, used service, service configuration, or other parameters) may improve the handover quality by making sure that the handover of the service can be performed in a seamless manner by transferring all the relevant context information so that the communications session can be continued at the new access point in the same manner as it was conducted at the previous access point. Just as an example the context information being transferred may involve information about the quality of service or the available services such as the bandwidth or data rate, and then the communications session after handover may be continued in an appropriate manner based on these context parameters.
A system according to an embodiment of the present invention and its advanta¬ geous effects will now be explained in connection with Fig. 5. Fig. 5 on the left- hand side shows a message sequence for a handover procedure in a wireless LAN system according to the standard IEEE 802.11. In this message sequence there is shown a station STA which has been connected to an old access point AP and which now is about to perform a handover to a new access point APnew. At first as illustrated on the top of this diagram there are sent probe requests and responses in three different channels by the station STA. While the standard itself does not require three channels it should be mentioned here that a good implementation will use three channels. This is for just looking around which new access point might be suitable or available for handover. For this purpose the station STA sends around these requests in three channels different from the channel of the ongoing present communication. Any access point ready for handover sends a corre¬ sponding response, as illustrated in the sequence diagram.
Once then a new access point has been selected there is performed an open sys¬ tem authentication which is also a term according to the standard IEEE 802.11. This open system authentication just means that the station exchanges a message with the new access point. This open system of authentication does not yet involve any security parameters, it is not a "real authentication" in the sense that any se- cure transmission or security check is involved in this authentication, it is therefore labeled "open system authentication".
After the open system authentication there follows a process of re-association, i.e. the station STA associates itself with the new access point. For this purpose at first there is sent a message from the station to the new access point Apnew. As a next step then the old access point contacts the AAA server to perform an authentication procedure to create a trust relationship between the old and the new access point. Then the old access point returns a message to the new access point to complete the establishment of a trust relationship between the two access points and to fi¬ nally agree that the new access point will take over thejnobile station. This proce¬ dure including the then two following steps which will be explained later is a so- called IAPP move producer between the old access point and the new access point. The exchange of these messages according to the inter-access point proto- col (IAPP) move procedure has the purpose of first of all informing the old access point AP that the new access point APnew will now take over the mobile station STA and to perform an authentication (the first to fourth messages in the IAPP move procedure). The fifth and sixth messages may be used for the transfer of context information, for example context information related to the services and the features of the ongoing communications session.
After the re-association has been performed an authentication procedure is per¬ formed for which EAP-TLS is the most common implementation. Here EAP stands for extensible authentication protocol and TLS for transport layer security. The message sequences shown with respect to this authentication in the diagram follow the prescriptions of the standard IEEE 802.11 i. As can be seen from the diagram this involves the exchange of a large number of messages, moreover, it involves two stages of message exchanges, namely from the station STA to the new access point APnew, from there to the AAA server, and back via the new access point to the station STA. All the messages together form the handover delay as indicated in the message sequence diagram of the left-hand side of Fig. 5, and the messages from the open system authentication to the EAP-TLS authentication form the re- authentication delay involved with the re-authentication of the station at the new access point APnew.
In the following the advantageous effects of a method and system according to an embodiment of the present invention will be explained in connection with the mes¬ sage sequence diagram on the right-hand side of Fig. 5. As can be seen from this diagram, the probe request and response there is the same as in the diagram on the left-hand side of Fig. 5. Similarly, the open system authentication after the probe request and response also is the same as in the left-hand side of Fig. 5. Moreover, also the sequences involved with the re-association are in principle the same as in the left-hand side message sequence diagram. However, the transmis¬ sion of context parameters in this embodiment (the last two messages in the IAPP move procedure) may involve the transmission of a security context, such as e.g. the key(s) and possibly other security related information such as an encryption algorithm, and/or an authentication algorithm like a hash-algorithm, necessary for the new access point to communicate with station STA.
As can be seen from the bottom part of the message sequence diagram on the right-hand side of Fig. 5 the actual re-authentication of the station STA at the new access point APnew is much faster than on the left-hand side, it merely involves the exchange of two authentication messages. This is because according to an em¬ bodiment of the present invention the security association between the station STA and the new access point has been created and delivered already in advance of the actual handover, e.g. by the transfer of the security context as described before in connection with the IAPP procedure.. For this reason merely the exchange of one pair of authentication messages (challenge and response) is necessary to perform the authentication of the station STA at the new access point. Moreover, as can be seen from the diagram on the right-hand side of Fig. 5 the authentication server AAA is not involved in this authentication procedure because all relevant security information has already in advance been delivered to the communication partners. As can be seen from a comparison of the message sequence diagrams on both sides of Fig. 5, the re-authentication delay and thereby the handover delay is sig- nificantly reduced in an embodiment according to the present invention when com¬ pared with the prior art as shown on the left-hand side of Fig. 5.
In the following the advantageous effects according to a further embodiment of the present invention will now be described in connection with Fig. 6. Fig. 6 on the left- hand side shows a message sequence diagram which is identical to the one on the right-hand side of Fig. 5. It should be noted here that with respect to the IAPP move procedure the last two messages which are used for the transfer of context information may involve the transfer of the security context, i.e. the exchange of the relevant keys between the communications partners so that the station STA is en- abled to communicate with the new access point APnew. Once this security con¬ text or security association has been transferred during the IAPP move procedure the actual authentication of the STA at the new access point APnew can be per¬ formed in the quick manner as shown on the right-hand side of Fig. 5 and the left- hand side of Fig. 6 without an involvement of the AAA server.
On the right-hand side there is shown a message sequence diagram according to a further embodiment of the present invention. In this embodiment it is assumed that the transfer of the security context parameters or the security associations has al- ready been taken place, in other words the new access point APnew is already aware of the relevant keys enabling it to communicate with the station STA. This may be the result of the generation of a secure neighbor graph as has been de¬ scribed in connection with previous embodiments of the present invention.
Once such a secure neighbor graph has been created and the security context has already been transferred, the IAPP move procedure involves only the exchange of two messages in order to inform the old access point AP that the new access point APnew is to take over the communications session with the station STA. In a par¬ ticular embodiment actually these two messages can be exchanged simultaneously (not in sequence) because a security association has been already generated be¬ tween the old access point AP and the new access point APnew. This means that the exchange of these two messages does not need to involve any security check, and for this reason the exchange of these two messages included in the IAPP move procedure may actually be sent simultaneously, thereby further decreasing the de¬ l laayy i innvvoollvveedd w wiitthh t thhee r ree--aauutthheennttiiccaattiioonn..
After the IAPP move procedure then the actual authentication of the station STA at the new access point APnew may be performed as already explained in connection with the diagram shown on the left-hand side of Fig. 6. In summary, in the case of the embodiment illustrated in connection with the message sequence diagram on the right-hand side of Fig. 6 the total handover delay can be further decreased compared with the procedure of a handover according to the prior art.
One could mention here that the embodiments explained in connection with Figs. 5 and 6 are embodiments where the handover is performed in a wireless LAN. How¬ ever, in principle the same procedure could also be performed in a fixed wired net- work. If in such a case of a fixed wired network there would be trust relationship between the access points, then the procedure would involve no delay in connec¬ tion with an AP to AP communication because there is already a security associa¬ tion between the access points the network and therefore no security association has to be created first between different access points. Nevertheless the creation of a neighbor graph in such a case would be beneficial because it avoids the distribu¬ tion of unnecessary security context information and therefore does not unneces¬ sarily increase the load of the network. However, with the embodiment as shown on the right-hand side of Fig. 6 the response waiting time during the re-association procedure (the IAPP move procedure) has been reduced so drastically that it al- most becomes negligible compared to the procedure in a wired network.
A further embodiment of the present invention will now be described in the follow¬ ing. According to this embodiment for the creation of a neighbor graph two types of security associations are generated. First of all, there is generated a security asso- ciation between the originating access point and those candidate elements in the neighborhood of this originating access point which could possibly be the target of a handover procedure. For these candidate access points there is created a trust re- lation or a security association between the originating access point and these can¬ didate elements, as was described in connection with Fig. 5, right hand side, and Fig. 6, left hand side by referring to the first four messages in the IAPP move pro¬ cedure. However, there is also a further security association or security context be- ing transferred to fully create the neighbor graph, and this other security association being transferred relates to the security association between the mobile station STA and the originating access point AP. This security association is for example trans¬ ferred by the fifth and sixth messages in the IAPP move procedure of the right hand side of Fig. 5 and the left hand side of Fig. 6.
According to one particular embodiment a certain access point which acts as an originating access point and for which the neighbor graph is generated not only determines the candidate elements based on which then the security context transfer between the originating access point and the candidate elements is per- formed, but also determines which mobile stations are served by this originating access point. For the mobile stations located and being served through the cover¬ age area of this originating access point the security associations between these mobile stations and the originating access point are also transferred to the candi¬ date elements to enable the fast handover as described before. In this embodiment the originating access point therefore transfers the security context or the security association to its neighboring candidate elements based on the individual mobile stations located in its coverage area.
According to a particular embodiment once a new mobile station enters the area of the originating access point this access point updates the neighbor graph by trans¬ ferring the security association established between this new mobile station and the originating access point also to the other candidate elements included in the neigh¬ bor graph to enable the fast handover for this mobile station from the originating access point to one of the candidate elements after the new mobile station has en- tered the area of the originating access point. This may be regarded as an update of the neighbor graph. The updating of the neighbor graph therefore involves the transfer of security asso¬ ciations between mobile stations and the originating access point. It may be trig¬ gered by the entering of a mobile station into the coverage area of a certain access point which then forms the originating access point for this newly entered mobile station and which therefore has to update its neighbor graph.
According to a further embodiment the updating of the neighbor graph may be de¬ pendent on the result of a status polling through which a certain access point checks by a polling which mobile stations are located in its coverage area. Such a polling may be performed at predefined moments in time or at predefined intervals.
According to a further embodiment the updating of a neighbor graph may also be based on a mobile station leaving the coverage area of a certain originating access point. After the mobile station has left the coverage area of the originating access point this originating access point may inform the candidate elements included in its neighbor graph about the leaving of this mobile station and about the fact that these candidate elements may delete their security associations related to this mobile station which just has left. In this manner an overflow or an over-accumulation of security associations which actually are not in use anymore at the different access point can be avoided.
However, it should be noted that in such a case it is preferable that then the neigh¬ bor graph is re-generated or updated at the access point into the coverage area of which the mobile station has moved. This avoids that the security association for this mobile station is deleted from such access points to which the mobile station actually could possibly hand over even after having moved into the new coverage area.
According to a particular embodiment the neighbor graph created for the certain access point (or originating access point) may depend also on the individual pa¬ rameters or character of the mobile stations located in the coverage area of this access point. If for example in the coverage area of this access point there is lo- cated one mobile station which may move relatively fast such that it requires a multi-hop neighbor graph, then due to this fact the neighbor graph for this originat¬ ing access point may involve multi-hop candidate elements. Once this mobile sta¬ tion leaves the coverage area of this originating access point, however, the candi- date elements which are included due to the multi-hop requirement may be can¬ celled from the neighbor graph of this originating access point.
According to one particular embodiment the individual candidate elements included in the neighbor graph of a certain originating access point may have corresponding identifiers which identify based on which mobile station they are included in the neighbor graph. As in case of the previous embodiment, for example, a certain candidate element may be included into the neighbor graph due to a first slowly moving mobile station and also due to a fast moving mobile station, in this case it will have two corresponding identifiers identifying these two mobile stations. If the fast moving mobile station leaves the coverage area, this candidate element will still be included in the neighbor graph because it is also included due to another mobile station. However, those candidate elements which are included into the neighbor graph only due to the fast moving mobile station (e.g. multihop stations which are not direct neighbors of the originating access point) may then by removed from the neighbor graph once this fast moving mobile station has left the coverage area of the originating access point.
The invention has been described in the foregoing by means of exemplary em¬ bodiments. It will be readily apparent to the skilled person that the methods ac- cording to the embodiments described may be implemented by computers or com¬ puter systems which are suitably programmed.
It will further be appreciated that the foregoing embodiments are for exemplary pur¬ poses only and may be modified by the skilled person.

Claims

1. A method for supporting a secure handover of a mobile terminal from a first network element to another network element, said method comprising: automatically determining based on the topology of said network for said first network element candidate network elements which can be expected to act as candidates for the handover from said first network element; generating a security association between said candidate network elements and said first network element to support a handover based on said security associa- tion.
2. The method of claim 1 , wherein the neighbouring network elements of said first network elements are determined as candidate network elements for a hando¬ ver.
3. The method of one of the preceding claims, further comprising:
- generating a security association between one or more of the mobile stations located in the area of said first network element and said candidate network elements.
4. The method of one of the preceding claims, further comprising:
- updating said generated security associations based on the entering of a new mobile station into the area of said first network element or based on the addition, removal, and/or moving of a network element in said network.
5. The method of one of claims 3 or 4, further comprising:
- generating said security associations depending on the properties or pa¬ rameters of the mobile stations located within the area of said first network element.
6. The method of one of the preceding claims, wherein said generation of said se¬ curity association comprises: generating by a security server a plurality of security associations, one for each pair of a candidate element and said first network element; transmitting said plurality of security associations to said first network element; sending said pairs of security associations from said first network element to said respective candidate elements.
7. The method of one of the preceding claims, wherein a security association for a certain pair consisting of said first network element and a candidate element comprises: the keying materials associated with said first network element to communicate with said first network element: the keying materials of said candidate network element necessary to communi¬ cate with said candidate network element.
8. The method of claim 7, wherein said keying materials associated with said first network element to communicate with said first network element are encrypted by said keying materials of said candidate network element necessary to communicate with said candidate net¬ work element, and said encrypted keying materials are sent to said candidate element to enable after decryption of said candidate element direct communication or a direct han¬ dover between said first network element and said candidate network element.
9. The method of one of the preceding claims, wherein said method is performed repeatedly to update the security associations be¬ tween said originating network element and said candidate elements.
10. The method of one of the preceding claims, wherein performing said method is triggered by the addition of a new network element to said network.
11. The method of one of the preceding claims, wherein a network element is removed from said neighbour graph if it remains idle for a predetermined period of time.
12. The method of one of the preceding claims, wherein the determination of the candidate elements includes the selection of elements in addition to neighbouring elements of the first network element to obtain a multihop structure for the candidate elements.
13. The method of claim 12, wherein the number of hops is determined by the network policy.
14. The method of one of the preceding claims, wherein the determination of candidate elements and/or the number of hops is determined based on environmental influences which may affect the practical ability or the likelihood of the first network element handing over to a certain candidate ele¬ ment.
15. The method of one of the preceding claims, wherein the determination of the candidate elements is based on the location of the first network element and/or the location of other network elements and the envi¬ ronmental conditions of these locations which may affect the ability and/or likeli¬ hood of a handover to a certain network element.
16. The method of one of the preceding claims, wherein the determination of the candidate elements is based on the movement of the first network element and/or the movement of another network element and/or the movement of a user.
17. The method of one of the preceding claims, wherein the determination of the candidate elements is based on site survey information indicating how the signal strength looks like if a network element is placed in a given location.
18. The method of one of the preceding claims, wherein the determination of the candidate elements is based on geographical informa¬ tion indicating which network elements will make no sense to use as handover candidate.
19. The method of claim 18, wherein the geographical information take into account environmental influences which can be determined based on location informa¬ tion and which may affect the possibility or the likelihood that a handover is performed to a certain candidate element.
20. The method of one of the preceding claims, further comprising: informing a unit responsible for the determination of the candidate elements about a movement of said first network element or any other network element to enable a re-determination of the candidate elements based on said movement.
21. The method of claim 20, further comprising: determining whether the movement is sufficiently significant to justify the re¬ creation of the neighbour graph.
22. The method of claim 21 , wherein said movement is judged to be significant enough if the set of neighbouring elements of said first network element has changed due to said movement.
23. The method of one of the preceding claims, further comprising: transmitting context parameters between said first network element and one or more of said candidate network elements.
24. An apparatus for supporting a secure handover of a mobile terminal from a first network element to another network element, said apparatus comprising: a module for automatically determining based on the topology of said network for said first network element candidate network elements which can be expected to act as candidates for the handover from said first network element; a module for generating a security association between said candidate network elements and said first network element to support a handover based on said se¬ curity association.
25. The apparatus of claim 24, wherein the neighbouring network elements of said first network elements are determined as candidate network elements for a han- dover.
26. The apparatus of one claims 24 or 25, further comprising:
- a module for generating a security association between one or more of the mobile stations located in the area of said first network element and said candidate network elements.
27. The apparatus of one of claims 24 to 26, further comprising:
- a module for updating said generated security associations based on the entering of a new mobile station into the area of said first network element or based on the addition, removal, and/or moving of a network element in said network.
28. The aparatus of one of claims26 or 27, further comprising: - a module for generating said security associations depending on the proper¬ ties or parameters of the mobile stations located within the area of said first network element.
29. The apparatus of one of claims 24 to 28, wherein said module for generation of said security association comprises: a module for generating a plurality of security associations, one for each pair of a candidate element and said first network element; a module for transmitting said plurality of security associations to said first net¬ work element; a module for sending said pairs of security associations from said first network element to said respective candidate elements.
30. The apparatus of one of claims 24 to 30, wherein a security association for a certain pair consisting of said first network element and a candidate element comprises: the keying materials associated with said first network element to communicate with said first network element; the keying materials of said candidate network element necessary to communi¬ cate with said candidate network element.
31.The apparatus of claim 30, wherein said keying materials associated with said first network element to communicate with said first network element are encrypted by said keying materials of said candidate network element necessary to communicate with said candidate net¬ work element, and said encrypted keying materials are sent to said candidate element to enable after decryption of said candidate element direct communication or a direct han¬ dover between said first network element and said candidate network element.
32. The apparatus of one of claims 24 to 31 , wherein said candidate element determination module and said security association generation module are adapted to operate repeatedly to update the security as¬ sociations between said originating network element and said candidate ele¬ ments.
33. The apparatus of one of claims 24 to 32, further comprising A module for triggering the operation of said candidate element determination module and said security association generation module by the addition of a new network element to said network.
34. The apparatus of one of claims 24 to 33, wherein a network element is removed from said neighbour graph if it remains idle for a predetermined period of time.
35. The apparatus of one of claims 24 to 34, wherein the determination of the candidate elements includes the selection of elements in addition to neighbouring elements of the first network element to obtain a multi- hop structure for the candidate elements.
36. The apparatus of claim 35, wherein the number of hops is determined by the network policy.
37. The apparatus of one of claims 24 to 36, wherein the determination of candidate elements and/or the number of hops is determined based on environmental influences which may affect the practical ability or the likelihood of the first network element handing over to a certain candidate ele¬ ment.
38. The apparatus of one of claims 24 to 37, wherein the determination of the candidate elements is based on the location of the first network element and/or the location of other network elements and the envi¬ ronmental conditions of these locations which may affect the ability and/or likeli¬ hood of a handover to a certain network element.
39. The apparatus of one of claims 24 to 38, wherein the determination of the candidate elements is based on the movement of the first network element and/or the movement of another network element and/or the movement of a user.
40. The apparatus of one of claims 24 to 39, wherein the determination of the candidate elements is based on site survey information indicating how the signal strength looks like if a network element is placed in a given location.
41. The apparatus of one of claims 24 to 40, wherein the determination of the candidate elements is based on geographical informa¬ tion indicating which network elements will make no sense to use as handover candidate.
42. The apparatus of one of claims 24 to 41 , the geographical information take into account environmental influences which can be determined based on location information and which may affect the possibility or the likelihood that a handover is performed to a certain candidate element.
43. The apparatus of one of claims 24 to 42, further comprising:: a module for informing a unit responsible for the determination of the candidate elements about a movement of said first network element or any other network element to enable a re-determination of the candidate elements based on said movement.
44. The apparatus of claim 43, further comprising: a module for determining whether the movement is sufficiently significant to justify the re-creation of the neighbour graph.
45. The apparatus of claim 44, wherein said movement is judged to be significant enough if the set of neighbouring elements of said first network element has changed due to said movement.
46. The apparatus of one of claims 24 to 45 further comprising: a module for transmitting context parameters between said first network element and one or more of said candidate network elements.
47. A computer program comprising computer program instructions which when being executed by a computer enable said computer to carry out a method ac¬ cording to one of claims 1 to 23.
48. A data carrier having recorded thereupon a computer program according to claim 47.
EP04786235A 2004-08-26 2004-08-26 Method and apparatus for supporting secure handover Withdrawn EP1782575A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2004/051918 WO2006021236A1 (en) 2004-08-26 2004-08-26 Method and apparatus for supporting secure handover

Publications (1)

Publication Number Publication Date
EP1782575A1 true EP1782575A1 (en) 2007-05-09

Family

ID=34959094

Family Applications (1)

Application Number Title Priority Date Filing Date
EP04786235A Withdrawn EP1782575A1 (en) 2004-08-26 2004-08-26 Method and apparatus for supporting secure handover

Country Status (3)

Country Link
EP (1) EP1782575A1 (en)
JP (1) JP4468449B2 (en)
WO (1) WO2006021236A1 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8130771B2 (en) * 2006-10-10 2012-03-06 Alcatel Lucent Packet-forwarding for proxy mobile IP
US20080095114A1 (en) * 2006-10-21 2008-04-24 Toshiba America Research, Inc. Key Caching, QoS and Multicast Extensions to Media-Independent Pre-Authentication
US20080207209A1 (en) * 2007-02-22 2008-08-28 Fujitsu Limited Cellular mobile radio communication system
US8411858B2 (en) * 2007-03-28 2013-04-02 Apple Inc. Dynamic foreign agent-home agent security association allocation for IP mobility systems
JP5210650B2 (en) * 2008-02-05 2013-06-12 日本無線株式会社 WiMAXGW base station control system
CN101286844B (en) 2008-05-29 2010-05-12 西安西电捷通无线网络通信有限公司 Entity bidirectional identification method supporting fast switching
KR101655264B1 (en) * 2009-03-10 2016-09-07 삼성전자주식회사 Method and system for authenticating in communication system
US9210622B2 (en) 2009-08-12 2015-12-08 Qualcomm Incorporated Method and apparatus for relay backhaul design in a wireless communication system
US9125133B2 (en) 2009-08-12 2015-09-01 Qualcomm Incorporated Method and apparatus for relay backhaul design in a wireless communication system
US8429728B2 (en) * 2009-08-24 2013-04-23 Alcatel Lucent Pre-registration security support in multi-technology interworking
CN103312670A (en) 2012-03-12 2013-09-18 西安西电捷通无线网络通信股份有限公司 Authentication method and system
CN103312499B (en) 2012-03-12 2018-07-03 西安西电捷通无线网络通信股份有限公司 A kind of identity identifying method and system
EP2645754B1 (en) * 2012-03-29 2015-02-25 Mitsubishi Electric R&D Centre Europe B.V. Trust based system and method for performing a handover from a source base station to a target base station

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2290195B (en) * 1994-06-10 1998-08-05 Northern Telecom Ltd Automatic determination and tuning of pico-cell topology for low-power wireless systems
EP1391100A4 (en) * 2001-05-02 2009-03-11 Strix Systems Inc Wireless base station neighbor discovery in a communication system employing a short-range frequency hopping scheme
KR100448318B1 (en) * 2002-11-08 2004-09-16 삼성전자주식회사 Method for hand-off in a wileless network
US7346772B2 (en) * 2002-11-15 2008-03-18 Cisco Technology, Inc. Method for fast, secure 802.11 re-association without additional authentication, accounting and authorization infrastructure

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2006021236A1 *

Also Published As

Publication number Publication date
JP2008511223A (en) 2008-04-10
JP4468449B2 (en) 2010-05-26
WO2006021236A1 (en) 2006-03-02

Similar Documents

Publication Publication Date Title
TWI393414B (en) Secure session keys context
CN1652630B (en) Method for generating access point addressable neighbouring areas map, the access point and wireless network
CN104244367B (en) Communication network and device
KR100991522B1 (en) Security context transmission method for handover in the High speed Portable internet system
EP2309698B1 (en) Exchange of key material
JP4764108B2 (en) Wireless terminal, management device, wireless LAN control method, wireless LAN system
US10530573B2 (en) System and method for wireless network access protection and security architecture
US20070076671A1 (en) System and method for network infrastructure driven context setup to facilitate roaming
KR20080063324A (en) Methods and apparatus for the utilization of mobile nodes for state transfer
CN101310480A (en) Methods and apparatus for the utilization of mobile nodes for state transfer
CN109413194B (en) User information cloud cooperative processing and transferring method for mobile communication system
WO2005027559A1 (en) Fast authentication method and apparatus for inter-domain handover
CN102348206B (en) Secret key insulating method and device
CN103460736A (en) A flexible system and method to manage digital certificates in a wireless network
CN101785343B (en) Method, system and device for fast transitioning resource negotiation
US9270652B2 (en) Wireless communication authentication
CN101981892A (en) Systems and methods for group key distribution and management for wireless communications systems
WO2006021236A1 (en) Method and apparatus for supporting secure handover
CN101627644A (en) Token-based dynamic key distribution method for roaming environments
EP2378802B1 (en) A wireless telecommunications network, and a method of authenticating a message
CN102655641B (en) Secure tunnel method for building up and base station
JP2005176340A (en) Global authentication continuity function during handoff to neighboring mobile switching center
CN102244857A (en) Wireless local area network roaming subscriber control method, device and network system
Huang et al. SAP: seamless authentication protocol for vertical handoff in heterogeneous wireless networks
KR100729725B1 (en) Method for authorization in wireless portable internet and system thereof

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20060818

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): DE GB

DAX Request for extension of the european patent (deleted)
RBV Designated contracting states (corrected)

Designated state(s): DE GB

17Q First examination report despatched

Effective date: 20100114

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20111209