WO2009132666A1 - A method for network access, related network and computer program product therefor - Google Patents
A method for network access, related network and computer program product therefor Download PDFInfo
- Publication number
- WO2009132666A1 WO2009132666A1 PCT/EP2008/003495 EP2008003495W WO2009132666A1 WO 2009132666 A1 WO2009132666 A1 WO 2009132666A1 EP 2008003495 W EP2008003495 W EP 2008003495W WO 2009132666 A1 WO2009132666 A1 WO 2009132666A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- iar
- router
- security
- address
- mobile terminal
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/086—Access security using security domains
Definitions
- This disclosure relates to techniques for providing access in communication networks.
- this disclosure relates to managing the mobility of data/voice communication terminals, with a view to providing integrated F/M (Fixed/Mobile) access to an Internet Protocol (IP) based network.
- F/M Fixed/Mobile
- IP Internet Protocol
- MIP Mobile IP
- IETF RFC3344 Mobile IP
- Document US-B-7 028 183 describes a technique to support secure communication based on the IPSec protocol in a clustered or distributed architecture, i.e. a network architecture including a plurality of edge routers that process the Encapsulating Security Payload (ESP) and/or the Authentication Header (AH) of a Internet Protocol Security (IPSec) tunnel on behalf of a multiplicity of end nodes.
- SA Security Association
- edge routers may require the execution and the exchange of protocol messages among various edge routers and/or may always require reference to a centralized repository (associated to the cryptographic node that manages the initial set-up of the Security Association).
- the object of the invention is thus to provide an improved arrangement which, i.a. may be exempt form those drawbacks.
- the invention also relates to a corresponding network as well as a related computer program product, loadable in the memory of at least one computer and including software code portions for performing the steps of the method of the invention when the product is run on a computer.
- a computer program product is intended to be equivalent to reference to a computer-readable medium containing instructions for controlling a computer system to coordinate the performance of the method of the invention.
- Reference to "at least one computer” is evidently intended to highlight the possibility for the present invention to be implemented in a distributed/ modular fashion.
- An embodiment of this disclosure is a network node, hereinafter referred to as an Integrated Access Router (IAR); such a node includes functional elements for controlling the access to an IP network and routing the data and voice traffic of mobile and fixed terminals.
- IAR Integrated Access Router
- terminal mobility may be managed without solutions of continuity (i.e. any break) as the mobile terminal moves between different access points (APs), such as e.g. unlicensed radio technology APs (Bluetooth, WiFi 802.11, WiMAX) or 2G/3G radio technology APs (GERAN/UTRAN).
- APs access points
- IP-based voice calls or data communications may thus be transferred from a network to another in a manner which is fully transparent (seamless) to the user.
- the architecture of the IAR node may include an element with the role of Security Gateway (SGW); the standard functionalities for managing the IPSec protocol associated with that element may be implemented by resorting to arrangements which permit to maintain active, without interrupting the on-going session(s) of a terminal as the terminal moves from an access area to another, i.e. from an IAR access node to another.
- SGW Security Gateway
- the arrangement disclosed herein is capable of managing the context related to a secure access session to the IP network as established by the mobile terminals.
- the arrangement disclosed herein is capable of managing in a seamless and substantially transparent way the transfer of a secure access connection to the IAR node as the terminal from an access node to another.
- a related re-configuration procedure may be largely independent of the underlying radio technology and may not require any change to the standard terminals.
- the arrangement disclosed herein is capable of notionally maintaining a steadily active access connection of a terminal to the same Security Gateway and an initial IAR node.
- the arrangement disclosed herein may be integrated with standard techniques for supporting mobility at the network layer.
- a tunnelling mechanism based on the ESP IPSec protocol may be used to provide the access connection of the terminal to the IP network, so that access node termination may not necessarily take place on a given node (Home node, as in the case of conventional solutions such as e.g. Mobile IP, 2G/3G, etc.), but rather take advantage of a
- Security Gateway function distributed over the IAR access nodes of the provider.
- the tunnel encapsulation mechanism may lead to assigning an innermost address which kept fixed, irrespective of any changes in the access sub-network, thus playing the role of identifying the terminal in the sessions which are kept active during the terminal mobility. This makes it possible to avoid having to re-establish a new ESP IPSec session as the access node changes by moving also the session context, which is completely transparent to the mobile terminal.
- the arrangement disclosed herein based on the use of the ESP IPSec protocol may be integrated with a mechanism of managing IP mobility and secure network access based on routing techniques and particularly on the dynamic announcement of the host-specific prefixes assigned to the terminals by the access nodes visited thereby (these host-specific prefixes are currently referred to as 732" prefixes in the Ipv4 protocol).
- Various embodiments of the arrangement disclosed herein are adapted for managing network layer mobility in a scenario of fixed/mobile integration. This may apply in particular to the management of the mobility within a same administrative net domain (intra-domain), possibly involving the adoption of dynamic announcement of the host-specific prefixes (e.g. 732" prefixes, IPv4) assigned to the terminals, in conjunction with the Security Association (SA) IPSec context being made available in a seamless manner to a plurality of access routers.
- SA Security Association
- This disclosure foresees the possible use of certain procedures to manage in a simple and efficient way those operations involved in making the context available in a seamless manner to a plurality of edge routers.
- this involves a mechanism of creating a structure and assigning an SPI identifier for the Security Association; the router will thus be able to immediately determine, by analysing a field in that identifier, the edge router (e.g. home IAR node) from which the context may be made available.
- the edge router e.g. home IAR node
- the disclosure herein provides a general integrated (fixed/mobile) access technique to an IP network which is adapted for use with a variety of possible access configurations and technologies.
- FIG. 3 shows an IPSec data packet.
- a multi-access network may include both mobile and fixed networks, such as e.g.
- FIG. 1 shows a scenario comprising WiFi, WiMAX and 2G/3G networks with their associated access networks, which have access a common IP network, such as the Internet.
- not only horizontal handoffs - such as a transfer of the communication of a mobile terminal MS1 from an WiFi access point AP to another -
- handoffs between different networks - such as a transfer of the communication of a mobile terminal MS2 from a WiMAX access point to 2G/3G access point (i.e. base station or Node B) -
- handoffs may involve a single operator (i.e. handover) or also different operators (i.e. roaming).
- an ESP IPSec tunnel may be established to a Security Gateway (SGW), which may form part of an Integrated Access Router (IAR).
- SGW Security Gateway
- IAR Integrated Access Router
- Such IPSec tunnel may provide a homogeneous access model independent from the underlying network technologies, which may be completely different. Specifically, the IP connection over the local IAR/SGW node is maintained or re-established automatically during the movement of the mobile terminal and the procedure is completely transparent to the user/mobile terminal.
- IPSec tunnel has also the advantage that communication over "vulnerable” radio technologies (e.g. WiFi) is protected against possible intrusion and/or interceptions.
- "vulnerable” radio technologies e.g. WiFi
- Various embodiments as described herein have the ability to maintain end-to-end communication sessions during the movement of the terminal, even in the case of a movement between access nets with different IAR/SGW nodes.
- mobility is usually designate as macro-mobility or network layer mobility.
- network layer mobility is supported through a management of the advertisement (announcement) mechanism of the terminal address.
- advertisement announcement
- IP addresses may be assigned, which are "persistent" to a change of the routing area.
- the specific addresses assigned to the mobile terminal are announced with the IP intra-domain routing protocols. Therefore, such addresses are "persistent" even though the address are assigned dynamically from the address pool, which is managed by the Home access node, because they are announced by the node that is currently responsible for the IP access of the terminal.
- this is achieved by announcing the host-specific (e.g. 732") prefix of the mobile terminal (i.e. the sub-net containing only the IP address of the mobile terminal) by the responsible access node, i.e. the visited access node when the terminal is not found in the Home access area.
- the host-specific (e.g. 732) prefix of the mobile terminal i.e. the sub-net containing only the IP address of the mobile terminal
- the responsible access node i.e. the visited access node when the terminal is not found in the Home access area.
- the number of host-specific prefixes which have to be announced explicitly in the intra-domain routing protocol are typically less than a few thousands. This number may even be reduced by suitable network optimizations such as intervening in opportune way on the aggregation of addresses, the dimension of the IAR nodes and the access areas.
- the mechanism above is used in conjunction with the Mobile IP (MIP) protocol, which permits also a management of mobility on a network layer.
- MIP Mobile IP
- Figures 2a to 2c illustrate some examples of an IPSec tunnel set up with different access technologies.
- Figure 2a shows how an IPSec tunnel 60 may be established with a typical WiFi/WiMAX access network.
- the mobile terminal establishes a connection to an access point AP.
- the access point AP forwards then the traffic through a suitable access network AN to an Integrated Access Router (IAR), which e.g. allows in turn access to a public IP network.
- IAR Integrated Access Router
- the access network may be any communication network, such as e.g. Ethernet or fibre optics, including also wireless networks.
- the IAR may even be included in the AP 1 without requiring an extra access network.
- the IAR comprises hardware or software modules (Security Gateway) responsible for the establishment and management of a Security Association with the mobile terminal MS via the IPSec protocol.
- Such a Security Gateway SGW may be implemented on the IAR node through one or more specialized modules, which manage the traffic of the IPSec tunnels.
- modules may be integrated in the IAR by means of one or more router interfaces mounted in expansion slots typically available in an IAR. In this case traffic coming from the line interfaces of the router and destined to the SGW unit(s) may be routed internally by the IAR node, exploiting the internal switching fabric.
- hardware modules may be controlled by one or more software or hardware components on the IAR node.
- the Security Gateway SGW may be implemented on the IAR node as an additional software module. This implementation may be suitable if performance requirements for the elaboration of the IPSec protocol are not particularly elevated.
- the ESP protocol of the IPSec suite may be used, as this allows modifying the origin address in the external header of the tunnel without invalidating the session.
- ESP may be used in the tunnel mode, which allows complete encapsulation of IP application packets of the mobile terminal.
- IP L an IP address, designated in the following as IP L , is assigned to the mobile terminal.
- IP address may be fixed or dynamically assigned to ensure enough connectivity to contact the IP address of the SGW.
- IP address IP L may also be only a local IP address, which per se has no connectivity to the public IP network.
- the IP address IP L is assigned directly by the AP, which supports layer 3 functions.
- the mobile terminal is able to contact the IP address associated to the SGW and establish the IPSec Tunnel 60.
- FIG. 2b shows an analogous configuration at the example of a possible 2G/3G communication link, wherein the AP represents the base-station and the traffic of the mobile terminal passes typically through a Gateway GPRS Serving/Support Node (GGSN).
- GGSN Gateway GPRS Serving/Support Node
- IP address IP L may be assigned by the GGSN node.
- Figure 2c shows a further example, wherein both the AP and the GGSN support only layer 2 functions.
- the IP address IP L may be assigned by the IAR node.
- a Point-to-Point Protocol (PPP) session may be established, such as a PPP link between the mobile terminal and the IAR node.
- PPP Point-to-Point Protocol
- the IP address is assigned dynamically and, consequently, a movement of the mobile terminal to another access point may cause a re-assignment of a new IP address IP L .
- any communication link and access network may be used in order to establish a data connection between the mobile terminal and the SGW node.
- any IP assignment mechanism may be used in the case of an
- the mobile station MS contacts the Security Gateway (SGW) and starts the usual procedures for establishing an ESP IPSec tunnel 60. During such operation the mobile station MS may receive also a second IP address IP M s. which has access to the public IP network.
- SGW Security Gateway
- the IP address IP MS will remain unchanged even after a possible handoff resulting e.g. from a movement of the mobile station. Therefore, the IP address IP MS may be used to identity the mobile terminal on a network layer.
- the SGW memorizes the information related to the IPSec session in a database, designated Security Association Database (SAD) and Security Policy Database (SPD).
- SAD Security Association Database
- SPD Security Policy Database
- the elements of the aforesaid database related to the IPSec session may be identified through a Security Parameter Index (SPI) assigned to the same session.
- SPI Security Parameter Index
- the parameter SPI is comprised of a 32-bit field assigned in arbitrary way by the SGW node.
- the SA i.e. the IPSec tunnel
- the SA is maintained active (always-on) in a way which is substantially transparent to the mobile terminal, even if the IAR node (and the associated SGW) may change.
- the SGW nodes which are distributed in the network behave as a single "virtual" Security
- the network operator may manage the SA associated to the mobile terminal in an appropriate manner in order to avoid that the mobile terminal has to re-establish the IPSec tunnel.
- the SA may be transferred to or reproduced (i.e. duplicated) on the new SGW: this operation may be performed on request or in a predictive manner.
- the mobile station MS may receive two IP addresses
- IP L and IP MS IP L and IP MS
- IP MS IP MS
- IPDEST IP MS and IPDEST as the source address and the destination address, respectively.
- the packet will be encapsulated having IP L and IP A ny_s G w. respectively, in the external header.
- Figure 3 shows in that respect an exemplary encapsulation scheme for the packets transmitted on the ESP IPSec Tunnel between the MS and the SGW.
- such an encapsulation scheme might be used to transmit a data packet comprising an IP header 30 having as source address IP MS and as destination address IP DEST , and the payload 40. This data packet is then encapsulated by encrypting the payload
- the SPI value has a dedicated field for the security gateway identification "SGW ID” and a dedicated field for the security association identification "SA
- such an encapsulated data packet might also have an EPS trailer 50.
- the mobile station MS may receive a new IP address IP L , designated in the following IP L _ NEW - However, this IP address is only used for the communication over the IPSec tunnel and not for the communication with the public IP network.
- the IAR node which receives the traffic from the MS over the new AP is again the Home IAR node. Consequently the packets are received and processed by the same SGW that has initially established the SA. Conversely, if the terminal has moved to an AP served by a different IAR node, designated in the following IAR VIS ⁇ D . the traffic transmitted by the MS will be received by a different SGW having the same IP address IP Any _s G w- This procedure is completely transparent to mobile station MS.
- the new SGW begins therefore to receive packets coming from the mobile terminal connected to the new IAR node.
- the IPSec communication will contain again the SPI field as pointer to the SA database.
- the parameters of the related SA are communicated (i.e. made available) to the new SGW VISITED -
- the new SGW V I S ⁇ ⁇ D may request a transfer or replication of the SA from the SGW H ⁇ me-
- the new SGWV ISITED may already contain a copy of the SA that has been replicated previously on candidate SGW due to a predictive strategy.
- this mechanism is optimized by assigning suitable SPI values, which identify the SA.
- the SPI value is assigned in an arbitrary way and is of local validity only. Nevertheless, the SPI values may be selected in a suitable way, which may identify univocally the SA established by different terminals with the SGWs of the network. This can be achieved by assigning SPI values which have global validity at least within the same network domain.
- the 32 bits of the SPI string may be structured in order to contain a dedicated space for identifying the SGW H ⁇ m e node (i.e. the node which has assigned the SA to the mobile terminal).
- SGW nodes are therefore able to determine if the SPI belongs to their own identification spaces. If the SPI has been assigned by the same SGW node (i.e. the SGW HOME node), the value is used to seek the relative SA in the database containing the "local" SA. Conversely, if the SGW determines that the SPI has been assigned by another node, the SGW node searches the SA in the database related to terminals connected to the net as "Visited". If this search fails, the SGW establishes that the terminal is implicitly starting a handover and requests, through opportune procedures, the SA for the session related to the MS from the SGW HOME node, which can be identified by the SPI value.
- the SGW node may memorize also the IP address IP MS assigned to the terminal.
- the IP address IP M s may then also be sent to the new SGW VISITED during the transfer or replication of the SA.
- the SGW VISITED node determines the IP address IP M s directly from the encapsulated data packet received from the mobile terminal. In this case the SGW VISITED node uses the transferred or replicated SA to decode the encapsulated data packets, which contains in the IP header 30 also the IP address IP M s of the mobile terminal. Once the necessary information has been inserted in the database, the SGW VIS ⁇ D, knowing the IP address representing the network identity of the mobile terminal, is able to forward correctly the traffic to the MS.
- the IAR node announces this IP address as a host-specific (e.g. 732") prefix, namely the subnet containing only the IP address IP M s with the intra-domain routing protocol in order to guarantee the correct routing of the traffic from the network toward the MS.
- This allows also the on-going application sessions to be maintained by redirecting the traffic to MS through the IAR VISITED node rather than through the IAR HOME node.
- the announcement of the host-specific prefix may be effected only starting from the IAR VISITED node, while for the node IAR HOME it is typically sufficient to announce only the sub-net of the IP pool from which the IP address IP M s has been assigned.
- usually explicit host-specific routes prevail over any sub-net routes (i.e. rule of the longest prefix matching).
- the first IAR node will eliminate the announcement of the host-specific prefix of MS, while a new announcement will be started by the second node.
- the new IAR node may notify (e.g. when the SA context is activated on the SGW of the new IAR) a handover of the mobile terminal to the preceding IAR node.
- the information is stored in the context of the MS managed by the IAR HOME node.
- every IAR Vlslted node which establishes communication with a mobile terminal, will communicate such information to the IAR HOME node.
- an embodiment may foresee the usage of the Mobile IP protocol in order to manage mobility.
- S ⁇ D node performs the role of a "Foreign Agent” and the IAR HOME node the role of "Home Agent” as specified in the MIP architecture.
- the two techniques may be used in combination.
- the host-specific prefix announcing mechanism is used by default and the MIP technique is used if the number of host-specific prefixes announced exceeds a predetermined threshold.
- an embodiment may use a "predictive" strategy.
- the information of active contexts, or rather the SA and related additional information may be used.
- Such nodes are in fact possible candidates for a handover operation from the current IAR node.
- the candidate IAR nodes may e.g. be derived from network planning information, which are usually available to the IAR or SGW nodes, which are therefore able to replicate in a proactive manner the context and related information.
- the candidate IAR/SGW nodes that receive a replica of the information of the context are those nodes which serve radio access areas in "contiguity" of the area currently visited by the mobile terminal.
- a "contiguity" existing between two areas means that their radio coverage areas overlaps partially or entirely (for instance in the case of a WiFi hot-spot inside a 2G/3G radio cells).
- the new IAR/SGW node will then inform the old IAR/SGW node that context information may be deleted.
- the old IAR/SGW node may inform the previous candidate nodes (i.e. those having received previously replicates of the context information) to delete the replicas/duplicates.
- the new IAR/SGW node will then identify new candidate nodes and transmit a replica of the context to them.
- Disconnection of a mobile terminal from the network may occur explicitly or implicitly.
- the mobile station MS will notify the SGW with a "Context Release" message.
- the node SGW receiving such message will cancel the partnership context to such terminal and, if the node does not coincide with the IAR H O ME node, it may notify in turn the IAR HOME node that it can remove also the original context.
- Implicit disconnection may occur e.g. when no activity takes place for a mobile terminal over a predetermined period of time.
- S ITED may remove the mobile station's context, also notifying the IAR H OME node for a cancellation of the original context. For example this may occur when a timer responsive to user's traffic or "Keepalive" packets, expires.
- a periodic exchange of "Keepalive" packets between the terminal and the net e.g. the anycast address IP A ny_s G w
- rnay be preferable in order to maintain the sessions with mobile terminals active. This allows the mobile terminal to remain connected even in the absence of traffic, or to activate the routing and SA context when a "silent" terminal moves to a new IAR node.
- the presence of Keepalive traffic in the IPSec tunnel will allow the terminal to hook to the new SGW, which activates the associated SA context in order to guarantee a correct delivery of IP packets from the network to the mobile station.
- the mobile station MS (not yet connected to the network) connect to an access node AP with layer 3 functions and, after being authenticated, receives a valid IP address IPL, which may also be a private IP address according to RFC1918.
- the MS connects to the any cast address IP A ny_s G w of the Security Gateway SGW of the operator. Such connection is terminated on the SGW of the "nearest" IAR node (e.g. based on the internal network routing protocol). Such IAR node assumes the role of the IARHOME node for MS.
- the MS is registered on SGWHOME node, and the MS and the SGWHOME node activate a Security Association SA through the IPSec protocol and create the ESP IPSec tunnel. Subsequently, the SGWHOME node assigns the IP address IP MS to the mobile terminal from an IP pool, which is announced in the intra-domain routing protocol of the operator. Additionally, the SGWHOME node assigns a 32-bit Security Parameter Index SPI, which holds in a first field a number identifying the SGWHOME node and in a second field a number that identifies in univocal way the SA.
- the MS is now able to activate a session on the IP network, wherein the application traffic is encapsulated in the IPSec tunnel with the SGS having the IP address (see e.g. figure 3).
- the IARHOME node will verify the correctness of the SA in the Security Database and route the traffic to the IP address IP MS of the mobile terminal over the ESP tunnel ESP.
- the MS and the SGW H OME node exchange periodically Keepalive packets in the same tunnel.
- the MS transmits the application traffic or Keepalive packets with the new address IPL NE W through the SA to the IP address IP A ny_s G w- Such traffic will be routed by the access network toward the SGW of the IAR V ISITED node, which is responsible for the routing area to which the MS has moved.
- the SGW V ISITED node When the SGW V ISITED node receives the packets from MS, it identifies such terminal through the SPI field, and requests the secure SA context from the IARHOME node. Alternatively the IAR V
- the IAR V ISITED node registers its identity as the node responsible for the communication of the MS, and stores its address as additional information for the session context at the IARHOME node.
- the IARHOME node may record such address at the moment of a request of the SA information from the IAR V ISITED node. At this moment the IARVISITED node has the SA context information available and is able to forward the traffic to the destination network.
- the IAR V ISITED node announces also the IP address IP MS of the MS as 732" (i.e. host-specific) prefix in the intra-domain routing protocols of the network in order to allow correct routing of the traffic from the network toward the mobile terminal.
- the MS may move from the routing area of an IARVISITED node, denoted in the following IAR V ISITED_OKJ. to a routing area of a new IARVISITED node, designated in the following as IAR V ⁇ s ⁇ ED _ New
- the MS connects to a new AP and, after being re- authenticated, receives a new IP address IP L _NEW-
- the MS transmits its application traffic or Keepalive packets through the SA to the IP address IP A ny_s G w- Such traffic will reach the SGW (i.e.
- the SGWv ⁇ s ⁇ D _ New node When the SGWv ⁇ s ⁇ D _ New node receives the packets from MS 1 it identifies the terminal through the SPI field, and requests the secure SA context from the IARHOME node.
- the IAR V ISITED node may already have such context if a proactive replication of the contexts has been activated.
- the SGW V ⁇ s ⁇ ED _ New node receives also the identity of the IAR V ISITED_OKJ node which was responsible for the MS.
- the IAR V ⁇ s ⁇ ED_New node registers its identity in the context of the MS at the IARHOME node or the update is performed directly by the IARHOME node at the moment of a request from the IAR V
- the IAR V ⁇ s ⁇ ED _ N ⁇ w node has the SA context information available and is able to forward the traffic to the destination network.
- the IAR V ⁇ s ⁇ ED_New node notifies the IAR V ISITED_OKJ node that it is now responsible for the MS and that it has to deactivate the announcement of the 732" prefix of the MS and that it may delete the SA context information.
- the IAR V ⁇ s ⁇ ED_NEw node announces also the IP address IPMS of the MS as host- specific 732" prefix in the intra-domain routing protocols of the network in order to allow correct routing of the traffic from the network toward the mobile terminal.
- the MS may move again in the routing area of the IARHOME node.
- the MS connects to a new AP and, after being re-authenticated, receives a new IP address IPL N E W -
- the MS transmits its application traffic or Keepalive packets now with the new IP address IP L _ N E W through the SA to the IP address IPAn y _s G w- Such traffic will reach the SGW (i.e. SGWHOME) of the IARHOME node.
- SGW i.e. SGWHOME
- the SGWHOME node When the SGWHOME node receives the packets from MS, it identifies the terminal through the SPI field, recognizes its own role as IARHOME node and activates the secure SA context present in its database.
- the IARHOME node notifies the preceding IAR V ISITED node that it has to deactivate the announcement of the host-specific prefix of the MS and that it may delete the
- the IARHOME node may also cancel the information on the identity of the IAR V IS!TEO node in the context of MS in its database.
- the IARHOME node is again able to forward the respective traffic to the MS.
- a MS may receive, after being re-authenticated, a new IP address IP L _ N E W -
- the MS now transmits its application traffic or Keepalive packets with the new IP address IPLJME W through the SA to the IP address IP Any _s G w- Such traffic will still reach the same IAR node, which controls the routing area in which the MS moves.
- the SGW HOME node receives the packets from MS 1 it identifies the terminal through the SPI field, and recognizes that is already has the secure SA context present in its database.
- the IAR node is therefore able to continue to forward the respective traffic to the MS.
- the MS sends of "Context Release” message to the IAR node to which it is currently connected.
- the IAR node receives this message and cancels the SA context of the MS in its database. In case the IAR node is not the IAR HOME home node, it will deactivate the announcement of the host-specific prefix and notify the deactivation also to the IAR HOME node that will handle in turn the cancellation of the original context.
- Implicit deactivation of the secure access context In the absence of consumer traffic or Keepalive packets and at a given Timeout associated with the MS, the IAR node will cancel the SA context of the MS in its database. In case the IAR node is not the IAR HOME home node, it will deactivate the announcement of the hot-specific prefix and notify the deactivation also to the IAR HOME node that will handle in turn the cancellation of the original context.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method of providing access of a mobile terminal (MS) to an IP network includes establishing a security association (SA) between the mobile terminal (MS) and a first security gateway (SGWHOME) of a first router (IARHOME) in said plurality of routers. The mobile terminal (MS) is provided access to the IP network via the first router (IARHOME). and the data exchanged between the mobile terminal (MS) and the first router (IARHOME) is encapsulated by using the security association (SA). The security association (SA) is made available to at least one second router (IARVISITED) having a second security gateway (SGWVISITED)- The mobile terminal (MS) is provided access to the IP network via said the second router (IARVISITED). and data exchanged between the mobile terminal (MS) and the second router (IARVISITED) are encapsulated by using the same security association (SA). Establishing the security association (SA) includes assigning a Security Parameter Index (SPI) that identifies univocally the first security gateway (SGWHOME) and the security association (SA). Making the security association (SA) available to the second router (IARVISITED) includes making available to the second router (IARVISITED) the Security Parameter Index (SPI). The second router (IARVISITED) may thus have access to the security association (SA) either by requesting it from the first router (IARHOME) or by identifying it in a set of security associations (SA) sent from the first router (IARHOME) to a set of routers candidate to become the second router (IARVISITED) as result of the mobility of the mobile terminal (MS).
Description
"A method for network access, related network and computer program product therefor"
Field of the Invention
This disclosure relates to techniques for providing access in communication networks.
Specifically, this disclosure relates to managing the mobility of data/voice communication terminals, with a view to providing integrated F/M (Fixed/Mobile) access to an Internet Protocol (IP) based network. Reference to this possible field of application is not however to be construed in a limiting sense of the scope of this disclosure.
Description of the Related Art
The problem of transferring communications from/to a mobile terminal from an access point/network to another has been already tackled in the past, and a number of solutions have been provided.
For instance, MIP (Mobile IP), as specified in IETF RFC3344 (see Perkins, C, "IP Mobility Support for IPv4", IETF RFC-3344, August 2002) allows an IP terminal to move from an IP access sub-network to another, without solutions of continuity (i.e. without breaks or interruptions).
These solutions maintain activity of the IP access session as initially established, even when the terminal is no longer in the area of coverage of the home access router, by rerouting the traffic to the home node. Document US-B-7 028 183 describes a technique to support secure communication based on the IPSec protocol in a clustered or distributed architecture, i.e. a network architecture including a plurality of edge routers that process the Encapsulating Security Payload (ESP) and/or the Authentication Header (AH) of a Internet Protocol Security (IPSec) tunnel on behalf of a multiplicity of end nodes. This document also describes certain procedures for distributing Security Association (SA) parameters negotiated by the end node and installing them on a plurality of edge routers. In that way the end node may move in a seamless way through the net by maintaining secure communication, that is by maintaining the SA as originally established. This document also mentions the case of a wireless access network, where additional procedures can be used for propagating, upon request, the SA information among the edge routers, thus allowing seamless roaming of the end nodes.
Document US2002/0165990 A1 discloses an arrangement wherein mobility is related to functional entities such as "home agent" and "foreign agent" entities, i.e. a mechanism of the Mobile IP type.
Object and Summary of the Invention
The applicant has noted that, despite certain advantages, the arrangements described in the foregoing inevitably suffer from some basic drawbacks.
For instance, they may imply the necessity of rerouting the traffic to the node Home, and/or require a new installation phase of an IPSec session to effect a handover between different access routers.
Also, they may require the execution and the exchange of protocol messages among various edge routers and/or may always require reference to a centralized repository (associated to the cryptographic node that manages the initial set-up of the Security Association).
Additionally, in an actual Internet environment, it may be necessary for the terminal to change its IP address, which would result in the TCP/UDP (Transport Control Protocol/User Datagram Protocol) sessions previously established being dropped: this will happen because the sessions are identified (also) via the IP addresses of the end-points of communication. The object of the invention is thus to provide an improved arrangement which, i.a. may be exempt form those drawbacks.
According to the present invention, that object is achieved by means of a method having the features set forth in the claims that follow. The invention also relates to a corresponding network as well as a related computer program product, loadable in the memory of at least one computer and including software code portions for performing the steps of the method of the invention when the product is run on a computer. As used herein, reference to such a computer program product is intended to be equivalent to reference to a computer-readable medium containing instructions for controlling a computer system to coordinate the performance of the method of the invention. Reference to "at least one computer" is evidently intended to highlight the possibility for the present invention to be implemented in a distributed/ modular fashion.
The claims are an integral part of the disclosure of the invention provided herein.
An embodiment of this disclosure is a network node, hereinafter referred to as an Integrated Access Router (IAR); such a node includes functional elements for controlling the access to an IP network and routing the data and voice traffic of mobile and fixed terminals.
In an embodiment, terminal mobility may be managed without solutions of continuity (i.e. any break) as the mobile terminal moves between different access points (APs), such as
e.g. unlicensed radio technology APs (Bluetooth, WiFi 802.11, WiMAX) or 2G/3G radio technology APs (GERAN/UTRAN). IP-based voice calls or data communications may thus be transferred from a network to another in a manner which is fully transparent (seamless) to the user. In an embodiment, the architecture of the IAR node may include an element with the role of Security Gateway (SGW); the standard functionalities for managing the IPSec protocol associated with that element may be implemented by resorting to arrangements which permit to maintain active, without interrupting the on-going session(s) of a terminal as the terminal moves from an access area to another, i.e. from an IAR access node to another. In an embodiment, the arrangement disclosed herein is capable of managing the context related to a secure access session to the IP network as established by the mobile terminals.
In an embodiment, the arrangement disclosed herein is capable of managing in a seamless and substantially transparent way the transfer of a secure access connection to the IAR node as the terminal from an access node to another. A related re-configuration procedure may be largely independent of the underlying radio technology and may not require any change to the standard terminals.
In an embodiment, the arrangement disclosed herein is capable of notionally maintaining a steadily active access connection of a terminal to the same Security Gateway and an initial IAR node.
In an embodiment, the arrangement disclosed herein may be integrated with standard techniques for supporting mobility at the network layer.
In an embodiment, a tunnelling mechanism based on the ESP IPSec protocol may be used to provide the access connection of the terminal to the IP network, so that access node termination may not necessarily take place on a given node (Home node, as in the case of conventional solutions such as e.g. Mobile IP, 2G/3G, etc.), but rather take advantage of a
Security Gateway function distributed over the IAR access nodes of the provider.
In an embodiment, the tunnel encapsulation mechanism may lead to assigning an innermost address which kept fixed, irrespective of any changes in the access sub-network, thus playing the role of identifying the terminal in the sessions which are kept active during the terminal mobility. This makes it possible to avoid having to re-establish a new ESP IPSec session as the access node changes by moving also the session context, which is completely transparent to the mobile terminal.
In an embodiment, the arrangement disclosed herein based on the use of the ESP IPSec protocol may be integrated with a mechanism of managing IP mobility and secure network access based on routing techniques and particularly on the dynamic announcement
of the host-specific prefixes assigned to the terminals by the access nodes visited thereby (these host-specific prefixes are currently referred to as 732" prefixes in the Ipv4 protocol).
Various embodiments of the arrangement disclosed herein are adapted for managing network layer mobility in a scenario of fixed/mobile integration. This may apply in particular to the management of the mobility within a same administrative net domain (intra-domain), possibly involving the adoption of dynamic announcement of the host-specific prefixes (e.g. 732" prefixes, IPv4) assigned to the terminals, in conjunction with the Security Association (SA) IPSec context being made available in a seamless manner to a plurality of access routers. This disclosure foresees the possible use of certain procedures to manage in a simple and efficient way those operations involved in making the context available in a seamless manner to a plurality of edge routers. In an embodiment, this involves a mechanism of creating a structure and assigning an SPI identifier for the Security Association; the router will thus be able to immediately determine, by analysing a field in that identifier, the edge router (e.g. home IAR node) from which the context may be made available.
The disclosure herein provides a general integrated (fixed/mobile) access technique to an IP network which is adapted for use with a variety of possible access configurations and technologies.
Brief description of the annexed drawings
The invention will now be described, by way of example only, with reference to the enclosed figures of drawing, wherein: - Figure 1 shows a typical multi-access network scenario;
- Figure 2a to 2c show possible communication links; and
- Figure 3 shows an IPSec data packet.
Detailed description of preferred embodiments
In the following description, numerous specific details are given to provide a thorough understanding of embodiments. The embodiments can be practiced without one or more of the specific details, or with other methods, components, materials, etc. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the embodiments.
Reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the
embodiment is included in at least one embodiment. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
The headings provided herein are for convenience only and do not interpret the scope or meaning of the embodiments.
As mentioned in the foregoing, the arrangements disclosed herein are particularly suitable for a multi-access network scenario, such as shown in figure 1. A multi-access network may include both mobile and fixed networks, such as e.g.
Wireless Fidelity (WiFi), Worldwide Interoperability for Microwave Access (WiMAX), or 2G/3G networks, and Local Area Networks (LAN) connected over a Digital Subscriber Line (DSL) to the Internet. By way of example, Figure 1 shows a scenario comprising WiFi, WiMAX and 2G/3G networks with their associated access networks, which have access a common IP network, such as the Internet.
In the network architecture as considered herein, not only horizontal handoffs - such as a transfer of the communication of a mobile terminal MS1 from an WiFi access point AP to another - but also handoffs between different networks - such as a transfer of the communication of a mobile terminal MS2 from a WiMAX access point to 2G/3G access point (i.e. base station or Node B) - may occur. Moreover, such handoffs may involve a single operator (i.e. handover) or also different operators (i.e. roaming).
According to this disclosure, an ESP IPSec tunnel may be established to a Security Gateway (SGW), which may form part of an Integrated Access Router (IAR). Such IPSec tunnel may provide a homogeneous access model independent from the underlying network technologies, which may be completely different. Specifically, the IP connection over the local IAR/SGW node is maintained or re-established automatically during the movement of the mobile terminal and the procedure is completely transparent to the user/mobile terminal.
Those skilled in the art will appreciate that such an IPSec tunnel has also the advantage that communication over "vulnerable" radio technologies (e.g. WiFi) is protected against possible intrusion and/or interceptions.
Various embodiments as described herein have the ability to maintain end-to-end communication sessions during the movement of the terminal, even in the case of a movement between access nets with different IAR/SGW nodes. In this case mobility is usually designate as macro-mobility or network layer mobility. In an embodiment, network layer mobility is supported through a management of the advertisement (announcement) mechanism of the terminal address.
For example a dynamic IP address pool may be defined and IP addresses may be assigned, which are "persistent" to a change of the routing area. In this case, if a terminal is not found in the area of coverage of the home access router, the specific addresses assigned to the mobile terminal are announced with the IP intra-domain routing protocols. Therefore, such addresses are "persistent" even though the address are assigned dynamically from the address pool, which is managed by the Home access node, because they are announced by the node that is currently responsible for the IP access of the terminal.
In an embodiment, this is achieved by announcing the host-specific (e.g. 732") prefix of the mobile terminal (i.e. the sub-net containing only the IP address of the mobile terminal) by the responsible access node, i.e. the visited access node when the terminal is not found in the Home access area.
The number of host-specific prefixes which have to be announced explicitly in the intra-domain routing protocol are typically less than a few thousands. This number may even be reduced by suitable network optimizations such as intervening in opportune way on the aggregation of addresses, the dimension of the IAR nodes and the access areas.
In an embodiment, the mechanism above is used in conjunction with the Mobile IP (MIP) protocol, which permits also a management of mobility on a network layer.
Figures 2a to 2c illustrate some examples of an IPSec tunnel set up with different access technologies.
Specifically, Figure 2a shows how an IPSec tunnel 60 may be established with a typical WiFi/WiMAX access network.
In such a network, the mobile terminal establishes a connection to an access point AP. The access point AP forwards then the traffic through a suitable access network AN to an Integrated Access Router (IAR), which e.g. allows in turn access to a public IP network.
Those skilled in the art will appreciate that the access network may be any communication network, such as e.g. Ethernet or fibre optics, including also wireless networks. Moreover, especially in the case of WiFi/WiMAX access points, the IAR may even be included in the AP1 without requiring an extra access network. In the exemplary embodiment shown, the IAR comprises hardware or software modules (Security Gateway) responsible for the establishment and management of a Security Association with the mobile terminal MS via the IPSec protocol.
Such a Security Gateway SGW may be implemented on the IAR node through one or more specialized modules, which manage the traffic of the IPSec tunnels. Such modules may be integrated in the IAR by means of one or more router interfaces mounted in expansion slots typically available in an IAR. In this case traffic coming from the line interfaces of the router and destined to the SGW unit(s) may be routed internally by the IAR
node, exploiting the internal switching fabric. Additionally, such hardware modules may be controlled by one or more software or hardware components on the IAR node.
In an embodiment, the Security Gateway SGW may be implemented on the IAR node as an additional software module. This implementation may be suitable if performance requirements for the elaboration of the IPSec protocol are not particularly elevated.
Those skilled in the art will appreciate that also mixed software/hardware implementation may be used. For example, additional software components may be required if the additional hardware modules or the IAR node (e.g. the network processor or the forwarding engine) are only able to elaborate the IPSec protocol in native way. Such SGW modules and the IPSec procedures are well known in the art, rendering a more detailed description herein unnecessary.
Preferably, the ESP protocol of the IPSec suite may be used, as this allows modifying the origin address in the external header of the tunnel without invalidating the session. Moreover, ESP may be used in the tunnel mode, which allows complete encapsulation of IP application packets of the mobile terminal.
In order to access the IAR node, and more specifically the Security Gateway SGW, an IP connection is established, and consequently an IP address, designated in the following as IPL, is assigned to the mobile terminal. Such an IP address may be fixed or dynamically assigned to ensure enough connectivity to contact the IP address of the SGW. For that purpose the IP address IPL may also be only a local IP address, which per se has no connectivity to the public IP network.
In the example shown in Figure 2a, the IP address IPL is assigned directly by the AP, which supports layer 3 functions.
Subsequently, the mobile terminal is able to contact the IP address associated to the SGW and establish the IPSec Tunnel 60.
Figure 2b shows an analogous configuration at the example of a possible 2G/3G communication link, wherein the AP represents the base-station and the traffic of the mobile terminal passes typically through a Gateway GPRS Serving/Support Node (GGSN). In this case the IP address IPL may be assigned by the GGSN node. Figure 2c shows a further example, wherein both the AP and the GGSN support only layer 2 functions. In such a case the IP address IPL may be assigned by the IAR node. For this purpose a Point-to-Point Protocol (PPP) session may be established, such as a PPP link between the mobile terminal and the IAR node.
In the above examples, the IP address is assigned dynamically and, consequently, a movement of the mobile terminal to another access point may cause a re-assignment of a new IP address IPL.
Those skilled in the art will appreciate that any communication link and access network may be used in order to establish a data connection between the mobile terminal and the SGW node. Moreover, any IP assignment mechanism may be used in the case of an
IP connection between the mobile terminal and the SGW node. Subsequent to the assignment of the IP address IPL, the mobile station MS contacts the Security Gateway (SGW) and starts the usual procedures for establishing an ESP IPSec tunnel 60. During such operation the mobile station MS may receive also a second IP address IPMs. which has access to the public IP network.
According to this disclosure, the IP address IPMS will remain unchanged even after a possible handoff resulting e.g. from a movement of the mobile station. Therefore, the IP address IPMS may be used to identity the mobile terminal on a network layer.
At the end of the IPSec tunnel setup process, the SGW memorizes the information related to the IPSec session in a database, designated Security Association Database (SAD) and Security Policy Database (SPD). The elements of the aforesaid database related to the IPSec session may be identified through a Security Parameter Index (SPI) assigned to the same session. According to the IPSec protocol, the parameter SPI is comprised of a 32-bit field assigned in arbitrary way by the SGW node.
In the exemplary embodiments described in the following, the SA (i.e. the IPSec tunnel) is maintained active (always-on) in a way which is substantially transparent to the mobile terminal, even if the IAR node (and the associated SGW) may change. This means that the SGW nodes which are distributed in the network behave as a single "virtual" Security
Gateway.
This is achieved by associating to the different SGW, according to a routing principle commonly known as "anycast", the same IP address IPAny_sGw- According to this disclosure the network operator may manage the SA associated to the mobile terminal in an appropriate manner in order to avoid that the mobile terminal has to re-establish the IPSec tunnel. For example, the SA may be transferred to or reproduced (i.e. duplicated) on the new SGW: this operation may be performed on request or in a predictive manner. The following is a description of an exemplary way of making SA available to a new
SGW by transfer or replication.
As explained in the foregoing, the mobile station MS may receive two IP addresses
(IPL and IPMS) and establish a SA with the SGW associated to the Home IAR node. In such case the IP packets sent by the mobile station MS to a generic destination having the IP address IPDEST will have IPMS and IPDEST as the source address and the destination address, respectively. According to the ESP IPSec protocol the packet will be encapsulated having IPL and IPAny_sGw. respectively, in the external header.
Figure 3 shows in that respect an exemplary encapsulation scheme for the packets transmitted on the ESP IPSec Tunnel between the MS and the SGW.
Specifically, such an encapsulation scheme might be used to transmit a data packet comprising an IP header 30 having as source address IPMS and as destination address IPDEST, and the payload 40. This data packet is then encapsulated by encrypting the payload
40 and encapsulating the data packet in a new IP packet. This is achieved by adding an external IP header 10 having as source address IPL and as destination address IPAny_sGw. and the mentioned Security Parameter Index SPI which forms part of the ESP IPSec Header
20. In the example shown, the SPI value has a dedicated field for the security gateway identification "SGW ID" and a dedicated field for the security association identification "SA
ID". According to the IPSec specification such an encapsulated data packet might also have an EPS trailer 50.
If the mobile station MS moves now to a new AP, the mobile station may receive a new IP address IPL, designated in the following IPL_NEW- However, this IP address is only used for the communication over the IPSec tunnel and not for the communication with the public IP network.
In the simplest case, the IAR node, which receives the traffic from the MS over the new AP is again the Home IAR node. Consequently the packets are received and processed by the same SGW that has initially established the SA. Conversely, if the terminal has moved to an AP served by a different IAR node, designated in the following IARVISΠΈD. the traffic transmitted by the MS will be received by a different SGW having the same IP address IPAny_sGw- This procedure is completely transparent to mobile station MS.
The new SGW begins therefore to receive packets coming from the mobile terminal connected to the new IAR node. As mentioned in the foregoing, the IPSec communication will contain again the SPI field as pointer to the SA database.
In order to maintain the pre-existing IPSec session the parameters of the related SA are communicated (i.e. made available) to the new SGWVISITED-
For this purpose, the new SGWVISΠΈD may request a transfer or replication of the SA from the SGWHθme- Alternatively, the new SGWVISITED may already contain a copy of the SA that has been replicated previously on candidate SGW due to a predictive strategy.
In an embodiment, this mechanism is optimized by assigning suitable SPI values, which identify the SA.
According to the IPSec protocol, the SPI value is assigned in an arbitrary way and is of local validity only. Nevertheless, the SPI values may be selected in a suitable way, which may identify univocally the SA established by different terminals with the SGWs of the network. This can be achieved by assigning SPI values which have global validity at least
within the same network domain. For example, the 32 bits of the SPI string may be structured in order to contain a dedicated space for identifying the SGWHθme node (i.e. the node which has assigned the SA to the mobile terminal).
According to this criterion, other SGW nodes are therefore able to determine if the SPI belongs to their own identification spaces. If the SPI has been assigned by the same SGW node (i.e. the SGWHOME node), the value is used to seek the relative SA in the database containing the "local" SA. Conversely, if the SGW determines that the SPI has been assigned by another node, the SGW node searches the SA in the database related to terminals connected to the net as "Visited". If this search fails, the SGW establishes that the terminal is implicitly starting a handover and requests, through opportune procedures, the SA for the session related to the MS from the SGWHOME node, which can be identified by the SPI value.
In an embodiment, the SGW node may memorize also the IP address IPMS assigned to the terminal. The IP address IPMs may then also be sent to the new SGWVISITED during the transfer or replication of the SA.
In an embodiment, the SGWVISITED node determines the IP address IPMs directly from the encapsulated data packet received from the mobile terminal. In this case the SGWVISITED node uses the transferred or replicated SA to decode the encapsulated data packets, which contains in the IP header 30 also the IP address IPMs of the mobile terminal. Once the necessary information has been inserted in the database, the SGWVISΠΈD, knowing the IP address representing the network identity of the mobile terminal, is able to forward correctly the traffic to the MS.
In an embodiment, the IAR node announces this IP address as a host-specific (e.g. 732") prefix, namely the subnet containing only the IP address IPMs with the intra-domain routing protocol in order to guarantee the correct routing of the traffic from the network toward the MS. This allows also the on-going application sessions to be maintained by redirecting the traffic to MS through the IARVISITED node rather than through the IARHOME node.
In fact, the announcement of the host-specific prefix may be effected only starting from the IARVISITED node, while for the node IARHOME it is typically sufficient to announce only the sub-net of the IP pool from which the IP address IPMs has been assigned. Those skilled in the art will appreciate that usually explicit host-specific routes prevail over any sub-net routes (i.e. rule of the longest prefix matching).
Accordingly, when the mobile terminal moves from an IARVISΠΈD to another IARVISITED, the first IAR node will eliminate the announcement of the host-specific prefix of MS, while a new announcement will be started by the second node. For this purpose, the new IAR node may notify (e.g. when the SA context is activated on the SGW of the new IAR) a handover of the mobile terminal to the preceding IAR node.
In order to identify the address of the preceding IAR node such information is stored in the context of the MS managed by the IARHOME node. For this purpose, every IARVlslted node, which establishes communication with a mobile terminal, will communicate such information to the IARHOME node. Instead of using the announcement of a host-specific (e.g. 732") prefix, an embodiment may foresee the usage of the Mobile IP protocol in order to manage mobility. In this case, the IARV|SΠΈD node performs the role of a "Foreign Agent" and the IARHOME node the role of "Home Agent" as specified in the MIP architecture.
In an embodiment, the two techniques may be used in combination. For example, the host-specific prefix announcing mechanism is used by default and the MIP technique is used if the number of host-specific prefixes announced exceeds a predetermined threshold.
As mentioned previously, an embodiment may use a "predictive" strategy. In this case, the information of active contexts, or rather the SA and related additional information
(e.g. the related IP address IPMS if stored in the database) are replicated and installed in advance in the database of the SGW serving adjacent routing areas. Such nodes are in fact possible candidates for a handover operation from the current IAR node.
The candidate IAR nodes may e.g. be derived from network planning information, which are usually available to the IAR or SGW nodes, which are therefore able to replicate in a proactive manner the context and related information. In an embodiment, the candidate IAR/SGW nodes that receive a replica of the information of the context, are those nodes which serve radio access areas in "contiguity" of the area currently visited by the mobile terminal. A "contiguity" existing between two areas means that their radio coverage areas overlaps partially or entirely (for instance in the case of a WiFi hot-spot inside a 2G/3G radio cells). Using a predictive strategy guarantees at the moment of a handover that the mobile terminal MS will already find on the new node the necessary information for managing correctly the related traffic.
In an embodiment, the new IAR/SGW node will then inform the old IAR/SGW node that context information may be deleted. For example, the old IAR/SGW node may inform the previous candidate nodes (i.e. those having received previously replicates of the context information) to delete the replicas/duplicates. The new IAR/SGW node will then identify new candidate nodes and transmit a replica of the context to them.
Disconnection of a mobile terminal from the network may occur explicitly or implicitly. In the former case, the mobile station MS will notify the SGW with a "Context Release" message. The node SGW receiving such message will cancel the partnership context to such terminal and, if the node does not coincide with the IARHOME node, it may notify in turn the IARHOME node that it can remove also the original context.
Implicit disconnection may occur e.g. when no activity takes place for a mobile terminal over a predetermined period of time. In this case, the node IARV|SITED may remove the mobile station's context, also notifying the IARHOME node for a cancellation of the original context. For example this may occur when a timer responsive to user's traffic or "Keepalive" packets, expires.
A periodic exchange of "Keepalive" packets between the terminal and the net (e.g. the anycast address IPAny_sGw) rnay be preferable in order to maintain the sessions with mobile terminals active. This allows the mobile terminal to remain connected even in the absence of traffic, or to activate the routing and SA context when a "silent" terminal moves to a new IAR node.
In the latter case, the presence of Keepalive traffic in the IPSec tunnel will allow the terminal to hook to the new SGW, which activates the associated SA context in order to guarantee a correct delivery of IP packets from the network to the mobile station.
Conversely, lack of receipt of a certain number of consecutive Keepalive packets from a mobile terminal may cause an interruption of the connection and a cancellation of the relative contexts.
In the following some exemplary procedures are described for the management of the sessions of the mobile terminals in the case of "persistent" IP addresses (i.e. using a 732" prefix announcing mechanism). Activation of a secure context for an access to the network of the provider
The mobile station MS (not yet connected to the network) connect to an access node AP with layer 3 functions and, after being authenticated, receives a valid IP address IPL, which may also be a private IP address according to RFC1918.
The MS connects to the any cast address IPAny_sGw of the Security Gateway SGW of the operator. Such connection is terminated on the SGW of the "nearest" IAR node (e.g. based on the internal network routing protocol). Such IAR node assumes the role of the IARHOME node for MS.
The MS is registered on SGWHOME node, and the MS and the SGWHOME node activate a Security Association SA through the IPSec protocol and create the ESP IPSec tunnel. Subsequently, the SGWHOME node assigns the IP address IPMS to the mobile terminal from an IP pool, which is announced in the intra-domain routing protocol of the operator. Additionally, the SGWHOME node assigns a 32-bit Security Parameter Index SPI, which holds in a first field a number identifying the SGWHOME node and in a second field a number that identifies in univocal way the SA. The MS is now able to activate a session on the IP network, wherein the application traffic is encapsulated in the IPSec tunnel with the SGS having the IP address
(see e.g. figure 3). In turn, the IARHOME node will verify the correctness of the SA in the Security
Database and route the traffic to the IP address IPMS of the mobile terminal over the ESP tunnel ESP. Moreover, the MS and the SGWHOME node exchange periodically Keepalive packets in the same tunnel.
Handover from IARHΠMF to IARVISITFΠ When the MS moves away from the routing area of the IARHOME node to a routing area of a different IAR node, the MS connects to a new AP and, after being re-authenticated, receives a new valid IP address IP__NEW-
The MS transmits the application traffic or Keepalive packets with the new address IPL NEW through the SA to the IP address IPAny_sGw- Such traffic will be routed by the access network toward the SGW of the IARVISITED node, which is responsible for the routing area to which the MS has moved.
When the SGWVISITED node receives the packets from MS, it identifies such terminal through the SPI field, and requests the secure SA context from the IARHOME node. Alternatively the IARV|SΠΈD node may already have such context if a proactive replication of the contexts has been activated.
The IARVISITED node registers its identity as the node responsible for the communication of the MS, and stores its address as additional information for the session context at the IARHOME node. Alternatively, the IARHOME node may record such address at the moment of a request of the SA information from the IARVISITED node. At this moment the IARVISITED node has the SA context information available and is able to forward the traffic to the destination network.
The IARVISITED node announces also the IP address IPMS of the MS as 732" (i.e. host- specific) prefix in the intra-domain routing protocols of the network in order to allow correct routing of the traffic from the network toward the mobile terminal.
Handover from IARVIRITFΠ ΠM to IARVIRITFD NBW
The MS may move from the routing area of an IARVISITED node, denoted in the following IARVISITED_OKJ. to a routing area of a new IARVISITED node, designated in the following as IARVιsιτED_New In this case, the MS connects to a new AP and, after being re- authenticated, receives a new IP address IPL_NEW-
With the new IP address IPL_NEW. the MS transmits its application traffic or Keepalive packets through the SA to the IP address IPAny_sGw- Such traffic will reach the SGW (i.e.
SGW VlSITED_New) Of thβ IARV|SITED_New nθdβ.
When the SGWvιsιτεD_New node receives the packets from MS1 it identifies the terminal through the SPI field, and requests the secure SA context from the IARHOME node.
Alternatively the IARVISITED node may already have such context if a proactive replication of
the contexts has been activated. In any case, the SGWVιsιτED_New node receives also the identity of the IARVISITED_OKJ node which was responsible for the MS.
The IARVιsιτED_New node registers its identity in the context of the MS at the IARHOME node or the update is performed directly by the IARHOME node at the moment of a request from the IARV|SΠΈD node.
The IARVιsιτED_Nβw node has the SA context information available and is able to forward the traffic to the destination network.
The IARVιsιτED_New node notifies the IARVISITED_OKJ node that it is now responsible for the MS and that it has to deactivate the announcement of the 732" prefix of the MS and that it may delete the SA context information.
The IARVιsιτED_NEw node announces also the IP address IPMS of the MS as host- specific 732" prefix in the intra-domain routing protocols of the network in order to allow correct routing of the traffic from the network toward the mobile terminal.
Handover from IARVIRITFΠ to IARHΠMF
The MS may move again in the routing area of the IARHOME node. In this case, the MS connects to a new AP and, after being re-authenticated, receives a new IP address IPL NEW-
The MS transmits its application traffic or Keepalive packets now with the new IP address IPL_NEW through the SA to the IP address IPAny_sGw- Such traffic will reach the SGW (i.e. SGWHOME) of the IARHOME node.
When the SGWHOME node receives the packets from MS, it identifies the terminal through the SPI field, recognizes its own role as IARHOME node and activates the secure SA context present in its database.
Moreover, the IARHOME node notifies the preceding IARVISITED node that it has to deactivate the announcement of the host-specific prefix of the MS and that it may delete the
SA context information. Additionally, the IARHOME node may also cancel the information on the identity of the IARVIS!TEO node in the context of MS in its database.
Finally, the IARHOME node is again able to forward the respective traffic to the MS.
Handover within a same routing area
If a MS moves and connects to a new AP that belongs to the same routing area (i.e. the same IAR node), it may receive, after being re-authenticated, a new IP address IPL_NEW-
The MS now transmits its application traffic or Keepalive packets with the new IP address IPLJMEW through the SA to the IP address IPAny_sGw- Such traffic will still reach the same IAR node, which controls the routing area in which the MS moves.
When the SGWHOME node receives the packets from MS1 it identifies the terminal through the SPI field, and recognizes that is already has the secure SA context present in its database.
The IAR node is therefore able to continue to forward the respective traffic to the MS.
Explicit deactivation of the secure access context
The MS sends of "Context Release" message to the IAR node to which it is currently connected.
The IAR node receives this message and cancels the SA context of the MS in its database. In case the IAR node is not the IARHOME home node, it will deactivate the announcement of the host-specific prefix and notify the deactivation also to the IARHOME node that will handle in turn the cancellation of the original context.
Implicit deactivation of the secure access context In the absence of consumer traffic or Keepalive packets and at a given Timeout associated with the MS, the IAR node will cancel the SA context of the MS in its database. In case the IAR node is not the IARHOME home node, it will deactivate the announcement of the hot-specific prefix and notify the deactivation also to the IARHOME node that will handle in turn the cancellation of the original context.
Without prejudice to the underlying principles of the invention, the details and the embodiments may vary, even appreciably, with reference to what has been described by way of example only, without departing from the scope of the invention as defined by the annexed claims.
Claims
1. A method of providing access of a mobile terminal (MS) to an IP network via a plurality of routers (IAR) having security gateways (SGW), the method including: - establishing a security association (SA) between said mobile terminal (MS) and a first security gateway (SGWHOME) of a first router (IARHOME) in said plurality,
- associating an IP address (IPMS) to said mobile terminal (MS) and providing access of said mobile terminal (MS) having associated said IP address to said IP network via said first router (IARHOME). wherein data exchanged between said mobile terminal (MS) having associated said IP address and said first router (IARHOME) are encapsulated by using said security association (SA),
- making said security association (SA) available to at least one second router (IARVISITED) in said plurality, said at least one second router (IARVISITED) having a second security gateway (SGWVISITED). - providing access of said mobile terminal (MS) having associated said IP address to said IP network via said at least one second router (IARVISITED), wherein data exchanged between said mobile terminal (MS) having associated said IP address and said at least one second router (IARVISITED) are encapsulated by using said security association (SA) made available to said at least one second router (IARVISITED). and wherein: - establishing said security association (SA) between said mobile terminal (MS) and said first security gateway (SGWHOME) includes assigning a Security Parameter Index (SPI) to said security association (SA), said Security Parameter Index (SPI) identifying univocally said first security gateway (SGWHOME) and said security association (SA); and
- making said security association (SA) available to said at least one second router (IARVISITED) includes making said Security Parameter Index (SPI) available to said at least one second router (IARVISITED) to enable said at least one second router (IARVISITED) to have access to said security association (SA).
2. The method of claim 1 , wherein encapsulating data using said security association (SA) includes:
- encrypting said data using said security association (SA),
- creating a data packet comprising said Security Parameter Index (SPI) and said encrypted data.
3. The method of either of claims 1 or 2, wherein making said security association
(SA) available to said at least one second router (IARVISITED) includes: - receiving at said second security gateway (SGWVISITED) a data packet from said mobile terminal (MS), said data packet comprising said Security Parameter Index (SPI) whereby said second security gateway (SGWVISITED) identifies said first security gateway (SGWHOME) based on said Security Parameter Index (SPI), and - requesting and obtaining said security association (SA) at said second security gateway (SGWVISITED) from said first security gateway (SGWHOME)-
4. The method of any of claims 1 to 3, wherein making said security association (SA) available to said at least one second router (IARVISITED) includes: - identifying at least one security gateway candidate to becoming said second security gateway (SGWVISITED),
- transmitting said security association (SA) from said first security gateway (SGWHOME) to said at least one said candidate security gateway.
5. The method of any of the preceding claims, including announcing the host-specific prefix of said IP address (IPMs) at said at least one second router (IARVISΠΈD) in the intra- domain routing protocols.
6. The method of any of claims 1 to 4, wherein said IP address (IPMS) is a mobile IP address as specified by the Mobile IP protocol and wherein a notification is sent to said first router (IARHOME) SO that said data is routed from said first router (IARHOME) to said second router (IARVISITED)-
7. The method of any of claims 1 to 5, including: - announcing at said at least one second router (IARV|SITED) the intra-domain routing protocols the host-specific prefix of said IP address (IPMS) if the number of host-specific routes is below a predetermined threshold, and
- sending a notification to said first router (IARHOME) SO that said data is routed from said first router (IARHOME) to said at least one second router (IARVISΓΓED) if said threshold is exceeded.
8. The method of any of the preceding claims, including:
- assigning an anycast IP address (IPAny_cast) to said security gateways (SGWHOME. SGWVISITED) of said plurality of routers (IAR), and - establishing an IP connection between said mobile terminal (MS) and one security gateway (SGWHOME- SGWVISITED) out of said security gateways (SGWHOME, SGWVISITED) by means of said anycast IP address (IPAπy_cast)- ■
9. The method of any of the previous claims, wherein the method further includes:
- making said security association (SA) available to at least one third router (IARVιsιτED_New) in said plurality, said at least one third router (IARVιsιτED_New) having a third security gateway (SGWV|S|TED_New),
- making said Security Parameter Index (SPI) available to said at least one third router (IARVιsιτED_New) to enable said at least one third router (IARVιsιτED_New) to have access to said security association (SA), and
- providing access of said mobile terminal (MS) having associated said IP address to said IP network via said at least one third router (IARV|SιτED_New). wherein data exchanged between said mobile terminal (MS) having associated said IP address and said at least one third router (IARVιsιτED_New) are encapsulated by using said security association (SA) made available to said at least one third router (IARVιsιτED_New)-
10. The method of claim 9, wherein making said security association (SA) available to at least one third router (IARVιsιτED_New) includes:
- receiving at said third security gateway (SGWVISITED) a data packet from said mobile terminal (MS), said data packet comprising said Security Parameter Index (SPI) whereby said third security gateway (SGWVιsιτED_Newj identifies said first security gateway (SGWHOME) based on said Security Parameter Index (SPI), and
- requesting and obtaining said security association (SA) at said third security gateway (SGWV|SιτED_Nβw) from said first security gateway (SGWHOME)-
1 1. The method of claim 5 in combination with either of claims 9 or 10, including: - deactivating said announcing the host-specific prefix of said IP address (IPMs) at said second router (IARVISITED). and
- announcing the host-specific prefix of said IP address (IPMS) at said third router (IARVιsιτED_New) in the intra-domain routing protocols.
12. The method of claim 11 , wherein an identifier of said second security gateway
(SGWVISITED) is stored in a database associated to said first security gateway (SGWHOME). and wherein said deactivating said announcing at said second security gateway (SGWVISITED) includes:
- requesting from said first security gateway (SGWHOME) said identifier of said second security gateway (SGWVISITED),
- sending a notification to said second security gateway (SGWVISITED),
- stopping said announcing at said second security gateway (SGWVISITED).
13. A network for providing access of a mobile terminal (MS) to an IP network, via a plurality of access points (AP) and a plurality of routers (IAR) wherein each router has a security gateway (SGW), said network being configured for performing the steps of any of claims 1 to 12.
14. The network of claim 13, wherein said access points (AP) are WiFi or WIMax access points or 2G/3G base-stations.
15. A computer program product, loadable in the memory of at least one computer and including software code portions for performing the steps of the method of any of claims 1 to 12.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/990,409 US9172722B2 (en) | 2008-04-30 | 2008-04-30 | Method for network access, related network and computer program product therefor |
EP08749243.5A EP2272270B1 (en) | 2008-04-30 | 2008-04-30 | A method for network access, related network and computer program product therefor |
PCT/EP2008/003495 WO2009132666A1 (en) | 2008-04-30 | 2008-04-30 | A method for network access, related network and computer program product therefor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2008/003495 WO2009132666A1 (en) | 2008-04-30 | 2008-04-30 | A method for network access, related network and computer program product therefor |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009132666A1 true WO2009132666A1 (en) | 2009-11-05 |
Family
ID=40366987
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2008/003495 WO2009132666A1 (en) | 2008-04-30 | 2008-04-30 | A method for network access, related network and computer program product therefor |
Country Status (3)
Country | Link |
---|---|
US (1) | US9172722B2 (en) |
EP (1) | EP2272270B1 (en) |
WO (1) | WO2009132666A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011110007A1 (en) * | 2010-08-30 | 2011-09-15 | 华为技术有限公司 | Method and system for tunnel renegotiation, access gateway and terminal thereof |
CN102447616A (en) * | 2010-10-11 | 2012-05-09 | 中兴通讯股份有限公司 | Key management method, system and device for routing protocol group |
WO2020049335A1 (en) * | 2018-09-04 | 2020-03-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Signalling storm mitigation in a secured radio access network |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI410105B (en) * | 2008-12-01 | 2013-09-21 | Inst Information Industry | Mobile station, access point, gateway apparatus, base station, and handshake method thereof for use in a wireless network framework |
JP2016063234A (en) * | 2014-09-12 | 2016-04-25 | 富士通株式会社 | Communication control method for communication device, communication device, and communication control system |
EP3387550B1 (en) | 2015-12-10 | 2020-12-02 | Microsoft Technology Licensing, LLC | Data driven automated provisioning of telecommunication applications |
US10129769B2 (en) | 2015-12-31 | 2018-11-13 | Affirmed Networks, Inc. | Adaptive peer overload control in mobile networks |
KR20180104639A (en) | 2016-01-15 | 2018-09-21 | 어펌드 네트웍스, 인크. | Database-based redundancy in the network |
CN113396393A (en) | 2019-01-15 | 2021-09-14 | 微软技术许可有限责任公司 | Dynamic auto-configuration of multi-tenant PAAS components |
CN110190956A (en) * | 2019-05-28 | 2019-08-30 | 杭州迪普科技股份有限公司 | Data transmission method, device, electronic equipment and machine readable storage medium |
CN112398851B (en) * | 2020-11-13 | 2023-01-10 | Oppo广东移动通信有限公司 | Data processing method, data processing device, storage medium and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040003280A1 (en) * | 2002-06-27 | 2004-01-01 | Nokia Corporation | Method and system for securely transferring context updates towards a mobile node in a wireless network |
EP1404143A2 (en) * | 2002-09-12 | 2004-03-31 | Nokia Corporation | Handover of a wireless terminal |
US20070234036A1 (en) * | 2006-03-30 | 2007-10-04 | Tan Tat K | Network mobility node authentication |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6907032B2 (en) * | 2000-03-06 | 2005-06-14 | Goremote Internet Communications, Inc. | Method for selecting terminating gateways for an internet telephone call using a tree search |
US20030041175A2 (en) * | 2001-05-03 | 2003-02-27 | Singhal Sandeep K | Method and System for Adapting Short-Range Wireless Access Points for Participation in a Coordinated Networked Environment |
US7028183B2 (en) * | 2001-11-13 | 2006-04-11 | Symantec Corporation | Enabling secure communication in a clustered or distributed architecture |
US7120930B2 (en) * | 2002-06-13 | 2006-10-10 | Nvidia Corporation | Method and apparatus for control of security protocol negotiation |
EP1618706A4 (en) * | 2003-03-18 | 2009-04-29 | Renesys Corp | Methods and systems for monitoring network routing |
US20050164729A1 (en) * | 2004-01-28 | 2005-07-28 | Vidya Narayanan | Method for providing seamless mobility to a mobile node in an optimized fashion |
US20060252438A1 (en) * | 2005-05-04 | 2006-11-09 | Ansamaa Jarkko H | Determining user equipment time zones for time-based service fulfillment |
US8379638B2 (en) * | 2006-09-25 | 2013-02-19 | Certes Networks, Inc. | Security encapsulation of ethernet frames |
US7926098B2 (en) * | 2006-12-29 | 2011-04-12 | Airvana, Corp. | Handoff of a secure connection among gateways |
-
2008
- 2008-04-30 EP EP08749243.5A patent/EP2272270B1/en active Active
- 2008-04-30 US US12/990,409 patent/US9172722B2/en active Active
- 2008-04-30 WO PCT/EP2008/003495 patent/WO2009132666A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040003280A1 (en) * | 2002-06-27 | 2004-01-01 | Nokia Corporation | Method and system for securely transferring context updates towards a mobile node in a wireless network |
EP1404143A2 (en) * | 2002-09-12 | 2004-03-31 | Nokia Corporation | Handover of a wireless terminal |
US20070234036A1 (en) * | 2006-03-30 | 2007-10-04 | Tan Tat K | Network mobility node authentication |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011110007A1 (en) * | 2010-08-30 | 2011-09-15 | 华为技术有限公司 | Method and system for tunnel renegotiation, access gateway and terminal thereof |
CN102396285A (en) * | 2010-08-30 | 2012-03-28 | 华为技术有限公司 | Method and system for tunnel renegotiation, access gateway and terminal thereof |
CN102447616A (en) * | 2010-10-11 | 2012-05-09 | 中兴通讯股份有限公司 | Key management method, system and device for routing protocol group |
CN102447616B (en) * | 2010-10-11 | 2016-08-24 | 中兴通讯股份有限公司 | A kind of Routing Protocol group key management method, system and equipment |
WO2020049335A1 (en) * | 2018-09-04 | 2020-03-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Signalling storm mitigation in a secured radio access network |
US12063510B2 (en) | 2018-09-04 | 2024-08-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Signalling storm mitigation in a secured radio access network |
Also Published As
Publication number | Publication date |
---|---|
US20110047612A1 (en) | 2011-02-24 |
US9172722B2 (en) | 2015-10-27 |
EP2272270B1 (en) | 2018-08-22 |
EP2272270A1 (en) | 2011-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2272270B1 (en) | A method for network access, related network and computer program product therefor | |
EP1938545B1 (en) | A network architecture and a method relating to access of user stations | |
US7515573B2 (en) | Method, system and apparatus for creating an active client list to support layer 3 roaming in wireless local area networks (WLANS) | |
JP5502905B2 (en) | Method for secure network-based route optimization in mobile networks | |
US7443809B2 (en) | Method, system and apparatus for creating a mesh network of wireless switches to support layer 3 roaming in wireless local area networks (WLANs) | |
US7529203B2 (en) | Method, system and apparatus for load balancing of wireless switches to support layer 3 roaming in wireless local area networks (WLANs) | |
US7817622B2 (en) | Unlicensed mobile access optimization | |
KR101050380B1 (en) | Method and system for controlling mobility in communication network, related network and computer program product for same | |
US20070002833A1 (en) | Method, system and apparatus for assigning and managing IP addresses for wireless clients in wireless local area networks (WLANs) | |
US20060245393A1 (en) | Method, system and apparatus for layer 3 roaming in wireless local area networks (WLANs) | |
US20060268834A1 (en) | Method, system and wireless router apparatus supporting multiple subnets for layer 3 roaming in wireless local area networks (WLANs) | |
US20050195780A1 (en) | IP mobility in mobile telecommunications system | |
JP2006505154A (en) | Method and apparatus for mobile IP dynamic home agent assignment | |
JP4909357B2 (en) | Method for transmitting data packets based on an Ethernet transmission protocol between at least one mobile communication unit and a communication system | |
EP2589258A1 (en) | Method and apparatus for a mobile node to connect to different access routers while maintaining a consistent network address | |
JP2010537528A (en) | How to perform a handover | |
CN102740290B (en) | Method for pre-authentication and pre-configuration, and system thereof | |
EP2299748B1 (en) | Method and system for supporting mobility security in the next generation network | |
US20100175109A1 (en) | Route optimisation for proxy mobile ip | |
Zhang et al. | Seamless mobility management schemes for IPv6-based wireless networks | |
Pentikousis | DMM H. Chan Internet-Draft Huawei Technologies Intended status: Informational P. Seite Expires: August 29, 2013 France Telecom-Orange | |
Bachmutsky | WiMAX Network Automation: Neighbor Discovery, Capabilities Negotiation, Auto‐Configuration and Network Topology Learning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08749243 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008749243 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12990409 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |