Secure Service and Network Framework for Mobile Ethernet

被引:0
作者
Masahiro Kuroda
Mariko Yoshida
Ryoji Ono
Shinsaku Kiyomoto
Toshiaki Tanaka
机构
[1] National Institute of Information and Communications Technology,
[2] Mitsubishi Electric Corporation,undefined
[3] KDDI R&D Laboratories Inc.,undefined
来源
Wireless Personal Communications | 2004年 / 29卷
关键词
security; authentication; security context; handover certificate; Beyond 3G; 4G; authentication protocol; mutual authentication; smart card; self-delegation; access control; 3GPP; WLAN; MIDP;
D O I
暂无
中图分类号
学科分类号
摘要
Secure cellular data services have become more popular in the Japanese market. These services are based on 2G/3G cellular networks and are expected to move into the next-generation wireless networks, called Beyond 3G. In the Beyond 3G, wireless communication available at a user's location is selected based on the type of the service. The user downloads an application from one wireless network and executes it on another. Beyond 3G expects core and wireless operators and allows to plug-in new wireless access. A security model that can accommodate these requirements needs to be sufficiently flexible for end users to utilize with ease. In this paper, we explain the Mobile Ethernet architecture for all IP networks in terms of the Beyond 3G. We discuss usage scenario/operator models and identify entities for the security model. We separate a mobile device into a personal identity card (PIC) containing cryptographic information and a wireless communications device that offers security and flexibility. We propose a self-delegation protocol for device authentication and use a delegated credential for unified network- and service-level authentication. We also propose proactive handover authentication using the security context between different types of wireless access, such as Third Generation Partnership Project (3GPP) and WLAN, so that the secure end-to-end communication channels established by service software on the TCP/IP are not terminated. Lastly, we raise security issues regarding the next-generation platform.
引用
收藏
页码:161 / 190
页数:29
相关论文
共 29 条
[1]  
Goldreich O.(1998)Self-delegation with Controlled Propagation-or-What If You Lose Your Laptop Proceedings of Crypto 98 1462 153-168
[2]  
Pftzmann B.(1990)Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms Proceedings of Auscrypt '90 453 246-264
[3]  
Rivest R.L.(2003)The Overview of the New Generation Mobile Communication System and the Role of Software Defined Radio Technology IEICE Transactions on Communication 12 3374-3384
[4]  
Chaum D.(2004)Scalable Mobile Ethernet and Fast Vertical Handover Proceedings of the IEEE Wireless Communications and Networking Conference 2004 A27 3-583
[5]  
Harada H.(2003)A Secure Service Architecture for Beyond 3G Wireless Network WPMC2003 V2 579-195
[6]  
Kuroda M.(2003)Design and Evaluation of Security Architecture for Beyond 3G Mobile Terminals WPMC2003 V1 191-331
[7]  
Morikawa H.(2003)Double Stuff Security for Beyond 3G Wireless Network WPMC2003 V2 327-168
[8]  
Wakana H.(1998)Self-Delegation with Controlled Propagation-or-What If You Lose Your Laptop Proceedings of Crypto 98 1462 153-undefined
[9]  
Adachi F.(undefined)undefined undefined undefined undefined-undefined
[10]  
Kuroda M.(undefined)undefined undefined undefined undefined-undefined