Advertisement

Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication

  • HyunGon Kim
  • ByeongKyun Oh
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3677)

Abstract

In next generation wireless networks, an application must be capable of rating service information in real-time and prior to initiation of the service it is necessary to check whether the end user’s account provides coverage for the requested service. However, to provide prepaid services effectively, credit-control should have minimal latency. In an endeavor to support real-time credit-control for Mobile IPv6 (MIPv6), we design an architecture model of credit-control authorization. The proposed integrated model combines a typical credit-control authorization procedure into the MIPv6 authentication procedure. We implement it on a single server for minimal latency. Thus, the server can perform credit-control authorization and MIPv6 authentication simultaneously. Implementation details are described as software blocks and units. In order to verify the feasibility of the proposed model, latency of credit-control authorization is measured according to various Extensible Authentication Protocol (EAP) authentication mechanisms. The performance results indicate that the proposed approach has considerably low latency compared with the existing separated models, in which credit-control authorization is separated from the MIPv6 authentication.

Keywords

Mobile node prepaid authorization Mobile IPv6 

References

  1. 1.
    Pat, R., Calhoun, J., Loughney, E., Guttman, G., Zorn, J.: Arkko: Diameter Base Protocol. RFC 3588 (2003)Google Scholar
  2. 2.
    3rd Generation Partnership Project; Technical Specification Group Services and System Aspects, Service aspects; Charging and Billing(release 5). 3GPP TS 22.115(v.5.2.1) (2002)Google Scholar
  3. 3.
    Hakala, H., Mattila, L., Koskinen, J.-P., Stura, M., Loughney, J.: Diameter Credit-Control Application. draft-ietf-aaa-diameter-cc-06.txt (2004)Google Scholar
  4. 4.
    Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. RFC 3775 (2004)Google Scholar
  5. 5.
    Faccin, S.M., Le, F., Patil, B., Perkins, C.E.: Diameter Mobile IPv6 Application. draft-le-aaa-diameter-mobileipv6-03.txt (2004)Google Scholar
  6. 6.
    Faccin, S.M., Le, F., et al.: Mobile IPv6 Authentication, Authorization, and Accounting Requirements. draft-le-aaa-mipv6-requirements-03.txt (August 2004)Google Scholar
  7. 7.
    Eronen, P. (ed.), Hiller, T., Zorn, G.: Diameter Extensible Authentication Protocol (EAP) Application. draft-ietf-aaa-eap-10.txt (2004)Google Scholar
  8. 8.
    Aboba, P.B., Wood, J.: Authentication, Authorization and Accounting (AAA) Transport Profile. RFC 3539 (2003)Google Scholar
  9. 9.
    Stewart, R., Xie, Q., Morneault, K., Sharp, C., Schwarzbauer, H., Taylor, T., Rytina, I., Kalla, M., Zhang, L., Paxson, V.: Stream Control Transmission Protocol. RFC 2960 (2000)Google Scholar
  10. 10.
    Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H. (eds.): Extensible Authentication Protocol (EAP). RFC 3748 (2004)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2005

Authors and Affiliations

  • HyunGon Kim
    • 1
  • ByeongKyun Oh
    • 1
  1. 1.Dept. of Information SecurityMokpo National UniversityJeonnamKorea

Personalised recommendations