簡易檢索 / 詳目顯示

研究生: 江明嘉
Ming-Chia Jiang
論文名稱: 以無線區域網路為中心之認證機制整合GPRS與無線區域網路
WLAN-Centric Authentication in Integrated GPRS-WLAN Networks
指導教授: 陳志成
Jyh-Cheng Chen
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2003
畢業學年度: 91
語文別: 英文
論文頁數: 71
中文關鍵詞: 無線區域網路GPRS安全性整合Authentication Authorization AccountingDiameter
外文關鍵詞: WLAN, GPRS, security integration, Authentication Authorization Accounting, Diameter
相關次數: 點閱:103下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 以SIM為基礎之認證機制來整合GPRS與WLAN網路,是比較被GPRS業者所接受的整合方法。此種方法必須在WLAN系統中執行GPRS的認證機制,並且在WLAN網路中將GPRS的認證訊息送回GPRS內部網路處理,我們稱為以GPRS為中心之整合方法。本篇論文則是提出了另一種以WLAN為中心的方法來整合GPRS與WLAN,並且是基於WLAN業者的角度而不是GPRS業者。本論文所提出的WLAN為中心之認證機制,相反地,是以WLAN為基礎之認證機制來整合兩系統,並且須要GPRS業者在其網路中安裝一個AAA伺服器。此方法是建構在一個鬆散結合的網路架構中,此外,我們假設此架構中的GPRS與WLAN是兩個獨立平行運作的網路,因此擁有各自的認證機制。本篇論文中,我們將針對各種不同的漫遊情形來做討論,亦即是對GPRS的用戶與WLAN使用者在兩個系統中漫遊時的所有情況來探討,並且詳述我們所提出之解決方法。我們也將所提出的整合方法實作在一個測試平台上,此測試平台包含了GPRS與WLAN的系統,並且透過實際的測試與實驗來分析其效能。


    A SIM-based authentication is preferable for GPRS operators for the integrated GPRS-WLAN networks. It requires WLAN system process the GPRS-based authentication and transport the GPRS authentication messages back to the GPRS networks. This thesis presents an alternative WLAN-centric approach based on the perspective of WLAN providers. The proposed WLAN-centric authentication instead leverages the widely used WLAN-based authentication and requires the GPRS operator install an AAA (Authentication, Authorization, and Accounting) server. The proposed approach is based on loose coupling architecture. In addition, it assumes that the GPRS and WLAN systems are two parallel networks and work independently. Scenarios for GPRS subscribers and WLAN users roaming between two systems are detailed. The proposed approach is implemented in a GPRS and WLAN testbed, which comprises most of the components in GPRS and WLAN systems. Performance analysis based on empirical experiments is also discussed.

    Acknowledgments Abstract List of Tables List of Figures 1. Introduction 1.1. Diameter Protocol 1.1.1. Security Issues in RADIUS 1.1.2. Overview of Diameter Base Protocol 1.1.3. Diameter EAP Application 1.2. Standard GPRS Attach Procedure 1.2.1. GPRS Authentication Procedure 1.2.2. GPRS Encryption Procedure 1.3. Organization of the Thesis 2. Related Work 2.1. Introduction 2.2. 3GPP Interworking Models 2.3. ETSI Interworking Architectures 2.4. Motorola's Solution 2.5. Nokia's Solution 2.6. Summary 3. Diameter 802.1X Application 3.1. Introduction 3.2. Proposed Diameter 802.1X Application 3.3. Summary 4. WLAN-centric Authentication 4.1. Introduction 4.2. System Architecture 4.3. GPRS Subscribers Roam into WLAN System 4.4. WLAN Users Roam into GPRS System 4.5. Requirements for MS 4.6. Requirements for WLAN System 4.7. Requirements for GPRS System 4.8. Comparisons With GPRS-centric Approach 4.9. Billing Considerations 4.9.1. Billing for GPRS Subscribers Roam into WLAN Networks 4.9.2. Billing for WLAN Users Roam into GPRS Networks 4.10. Summary 5. Testbed and Experiments 5.1. Introduction 5.2. Testbed Architecture 5.3. Implementation of Diameter 802.1X Application 5.4. Experiments and Analysis 5.5. Summary 6. Conclusions Bibliography

    [1] H.-W. Lin, J.-C. Chen, M.-C. Jiang, and C.-Y. Huang, ``Integration of GPRS and wireless LANs with multimedia applications,'' Lecture Notes in Computer Science: Advances in Multimedia Information Processing PCM 2002, Springer, pp. 704--711, Dec. 2002.
    [2] 3GPP TR 22.934, ``Feasibility study on 3GPP system to Wireless Local Area Network (WLAN) interworking,'' Dec. 2002.
    [3] 3GPP TR 23.934, ``3GPP system to wireless local area network (WLAN) interworking; Functional and architectural definition,'' Aug. 2002.
    [4] ETSI TR 101 683, ``Broadband Radio Access Networks (BRAN); HIPERLAN Type2;
    System Overview,'' Oct. 2001.
    [5] ETSI TR 101 957, ``Requirements and architectures for interworking between HIPERLAN/2 and 3rd generation cellular systems,'' Aug. 2001.
    [6] P. R. Calhoun, J. Arkko, E. Guttman, G. Zorn, and J. Loughney, ``Diameter base protocol.'' draft-ietf-aaa-diameter-17.txt, June 2002.
    [7] L. Blunk and J. Vollbrecht, ``PPP Extensible Authentication Protocol (EAP).'' IETF RFC 2284, Mar. 1998.
    [8] C. Rigney, S. Willens, A. Rubens, and W. Simpson, ``Remote authentication dial in user service (RADIUS).'' IETF RFC 2865, June 2000.
    [9] D. Mitton, M. St.Johns, S. Barkley, D. Nelson, B. Patil, M. Stevens, and B. Wolff, ``Authentication, Authorization, and Accounting: Protocol evaluation.'' IETF RFC 3127, June 2001.
    [10] T. Hiller and G. Zorn, ``Diameter extensible authentication protocol (eap) application.'' draft-ietf-aaa-eap-00.txt, Dec. 2002.
    [11] B. Aboba and J. Wood, ``Authentication, Authorization and Accounting (AAA) Transport Profile.'' draft-ietf-aaa-transport-12.txt, Jan. 2003.
    [12] B. Aboba, G. Zorn, and D. Mitton, ``RADIUS and IPv6.'' IETF RFC 3162, Aug. 2001.
    [13] S. Kent and R. Atkinson, ``Security Architecture for the Internet Protocol.'' IETF RFC 2401, Nov. 1998.
    [14] B. Aboba, J. Arkko, and D. Harrington, ``Introduction to Accounting Management.'' IETF RFC 2975, Oct. 2000.
    [15] R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson, ``Stream Control Transmission Protocol.'' IETF
    RFC 2960, Oct. 2000.
    [16] M. S. Chiba, G. Dommety, M. Eklund, D. Mitton, and B. Aboba, ``Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS).'' draft-
    chiba-radius-dynamic-authorization-20.txt, May 2003.
    [17] P. R. Calhoun, S. Farrell, and W. Bulley, ``Diameter CMS Security Application.'' draft-ietf-aaa-diameter-cms-sec-04.txt, Mar. 2002.
    [18] B. Aboba, P. Calhoun, S. Glass, T. Hiller, P. McCann, H. Shiino, P. Walsh, G. Zorn, G. Dommety, C. Perkins, B. Patil, D. Mitton, S. Manning, M. Beadles, S. Sivalingham, A. Hameed, M. Munson, S. Jacobs, B. Lim, B. Hirschman, R. Hsu, H. Koo, M. Lipford, E. Campbell, Y. Xu, S. Baba, and E. Jaques, ``Criteria for evaluating aaa protocols for network access.'' IETF RFC 2989, Nov. 2000.
    [19] P. R. Calhoun, W. Bulley, A. C. Rubens, J. Haag, G. Zorn, and D. Spence, ``Diameter NASREQ application.'' IETF Internet Draft, <draft-ietf-aaa-diameter-nasreq-09.txt>, work in progress, Mar. 2002.
    [20] P. R. Calhoun, T. Johansson, and C. E. Perkins, ``Diameter Mobile IP application.'' IETF Internet Draft, <draft-ietf-aaa-diameter-mobileip-14.txt>, work in progress, Apr. 2003.
    [21] T. Dierks and C. Allen, ``The TLS Protocol.'' IETF RFC 2246, Jan. 1999.
    [22] S. Kent and R. Atkinson, ``IP Authentication Header.'' IETF RFC 2402, Nov. 1998.
    [23] S. Kent and R. Atkinson, ``IP Encapsulating Security Payload (ESP).'' IETF RFC 2406, Nov. 1998.
    [24] D. Harkins and D. Carrel, ``The Internet Key Exchange (IKE).'' IETF RFC 2409, Nov. 1998.
    [25] 3GPP TS 23.060, ``General Packet Radio Service (GPRS) Service description Stage 2,'' Jan. 2002.
    [26] ETSI TS 100 929, ``Security related network functions,'' July 2001.
    [27] ETSI TS 101 106, ``GPRS ciphering algorithm requirements,'' May 2001.
    [28] 3GPP TS 23.228, ``IP Multimedia Subsystem; Stage 2,'' June 2002.
    [29] ``Motorola.'' http://www.motorola.com/.
    [30] A. K. Salkintzis, C. Fors, and R. Pazhyannur, ``WLAN-GPRS Integration for Next-Generation Mobile Data Networks,'' IEEE Wireless Communications Maganize, pp. 112--124, Oct. 2002.
    [31] ``Nokia.'' http://www.nokia.com/.
    [32] J. Ala-Laurila, J. Mikkonen, and J. Rinnemaa, ``Wireless LAN Access Network Architecture for Mobile Operators,'' IEEE Wireless Communications Maganize, pp. 82--89,
    Nov. 2001.
    [33] R. Rivest, ``The MD5 Message-Digest Algorithm.'' IETF RFC 1321, Apr. 1992.
    [34] B. Aboba and D. Simon, ``PPP EAP TLS Authentication Protocol.'' IETF RFC 2716, Oct. 1999.
    [35] H. Andersson, S. Josefsson, G. Zorn, D. Simon, and A. Palekar, ``Protected EAP Protocol (PEAP).'' IETF Internet Draft, <draft-josefsson-pppext-eap-tls-eap-02.txt>, work
    in progress, Feb. 2002.
    [36] J.-C. Chen and T. Zhang, IP-Based Next-Generation Wireless Networks. Wiley, Dec. 2003. To appear.
    [37] ETSI TS 100 922, ``Subscriber Identity Modules (SIM) Functional characteristics,'' Apr. 2000.
    [38] GSM 04.07, ``Mobile radio interface signalling layer 3; General aspects,'' Dec. 1999.
    [39] 3GPP TS 04.08, ``Mobile radio interface; Layer 3 specification,'' Nov. 2001.
    [40] ETSI TS 100 974, ``Mobile Application Part (MAP) specification,'' Mar. 2002.
    [41] R. Droms, ``Dynamic Host Configuration Protocol.'' IETF RFC 2131, Mar. 1997.
    [42] GSM 11.11, ``Specification of the Subscriber Identity Module-Mobile Equipment (SIM-ME) interface,'' Dec. 2001.
    [43] GSM 03.38, ``Alphabets and language-specific information,'' July 1998.
    [44] GSM 04.11, ``Point-to-Point (PP) Short Message Service (SMS) support on mobile radio interface,'' Aug. 1999.
    [45] GSM 11.14, ``Specification of the SIM Application Toolkit for the Subscriber Identity Module-Mobile Equipment (SIM-ME) interface,'' Aug. 2000.
    [46] ETSI TS 101 347, ``GPRS Tunnelling Protocol (GTP) across the Gn and Gp Interface,'' June 2002.
    [47] ``Industrial Technology Research Institute, Taiwan.'' http://www.itri.org.tw.
    [48] ``OpenDiameter.'' http://www.opendiameter.org/.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)

    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE