Mobility and Key Management in SAE/LTE
Often in wireless communications the cryptographic algorithm is considered as ‘the security solution’ but actually it is only the nucleus. The means for using the cryptographic algorithm is the ‘key’ used by the algorithm. Thus management of keys and security there-of is an important issue. The security of the key management solution should not impede mobility of devices by adding undue delays. Thus, secure and fast key management during mobility is an important issue for the third generation partnership project (3GPP) activity on system architecture evolution/long-term evolution (SAE/LTE). In this paper we review mobility and security issues with the focus of key management in SAE/LTE and present possible existing solutions together with their analysis.
KeywordsMobile Node Long Term Evolution Correspondent Node General Packet Radio Service Extensible Authentication Protocol
Unable to display preview. Download preview PDF.
- 1.3GPP Gantt Chart, http://www.3gpp.org/ftp/Specs/html-info/GanttChart- Level-2.htm#32085.
- 2.3GPP TR 25.913: “Requirements for Evolved UTRA (E-UTRA) and Evolved UTRAN (E-UTRAN)”.Google Scholar
- 3.3GPP TR 25.912: “Feasibility Study for Evolved UTRA and UTRAN”.Google Scholar
- 4.3GPP TS 36.300: “Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access (E-UTRAN); Overall description; Stage 2”.Google Scholar
- 5.UTRA-UTRAN Long Term Evolution (LTE) and 3GPP System Architecture Evolution (SAE), http://www.3gpp.org/Highlights/LTE/LTE.htm.
- 6.mITF: “Mobile IT Forum 4G Mobile System Requirements Document,” Ver. 1.1.Google Scholar
- 7.3GPP TR 25.814: “Physical Layer Aspects for Evolved Universal Terrestrial Radio Access (UTRA)”.Google Scholar
- 8..3GPP TR 33.821: “Rationale and Track of Security Decisions in Long Term Evolved RAN/3GPP System Architecture Evolution”.Google Scholar
- 9.3GPP TS 33.922: “Security Aspects for Inter-Access Mobility Between Non 3GPP and 3GPP Access Network”.Google Scholar
- 10.3GPP TR 23.401: “General Packet Radio Service (GPRS) Enhancements for Long Term Evolution (LTE) Access”.Google Scholar
- 11.3GPP TS 23.402: “3GPP System Architecture Evolution (SAE): Architecture Enhancements for Non-3GPP Accesses”.Google Scholar
- 12.3GPP TR 22.258: “Service Requirements for an All-IP Network (AIPN); Stage 1”.Google Scholar
- 13.3GPP TR 22.978: “All-IP Network (AIPN) Feasibility Study”.Google Scholar
- 14.3GPP TR 23.882: “3GPP System Architecture Evolution: Report on Technical Options and Conclusions”.Google Scholar
- 15.3GPP TR 21.902: “Evolution of 3GPP System”.Google Scholar
- 16.Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. Levkowetz, “Extensible Authentication Protocol (EAP)”, RFC 3748, June 2004.Google Scholar
- 17.IETF Handover Keying(HOKEY) working group http://www.ietf.org/ html.charters/hokey-charter.html.
- 18.J. Arkko and H. Haverinen, EAP AKA Authentication, Internet Draft draft- arkko-pppext-eap-aka-13, October 2004.Google Scholar
- 19.V. Narayanan and L. Dondeti, EAP Extensions for Efficient Re-authentication, Internet Draft, draft-vidya-eap-er-02, expires July 23, 2007.Google Scholar
- 20.IETF Protocol for carrying Authentication for Network Access working group http://www.ietf.org/html.charters/pana-charter.html.
- 21.Ashutosh Dutta, Tao Zhang, Yopshihiro Ohba, Kenichi Taniuchi, Henning Schulzrinne, “MPA assisted Optimized Proactive Handoff Scheme,” mobiqui-tous, pp. 155-165, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2005.Google Scholar