Advertisement

Mobility and Key Management in SAE/LTE

  • Anand R. Prasad
  • Julien Laganier
  • Alf Zugenmaier
  • Mortaza S. Bargh
  • Bob Hulsebosch
  • Henk Eertink
  • Geert Heijenk
  • Jeroen Idserda
Part of the Signals and Communication Technology book series (SCT)

Often in wireless communications the cryptographic algorithm is considered as ‘the security solution’ but actually it is only the nucleus. The means for using the cryptographic algorithm is the ‘key’ used by the algorithm. Thus management of keys and security there-of is an important issue. The security of the key management solution should not impede mobility of devices by adding undue delays. Thus, secure and fast key management during mobility is an important issue for the third generation partnership project (3GPP) activity on system architecture evolution/long-term evolution (SAE/LTE). In this paper we review mobility and security issues with the focus of key management in SAE/LTE and present possible existing solutions together with their analysis.

Keywords

Mobile Node Long Term Evolution Correspondent Node General Packet Radio Service Extensible Authentication Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    3GPP Gantt Chart, http://www.3gpp.org/ftp/Specs/html-info/GanttChart- Level-2.htm#32085.
  2. 2.
    3GPP TR 25.913: “Requirements for Evolved UTRA (E-UTRA) and Evolved UTRAN (E-UTRAN)”.Google Scholar
  3. 3.
    3GPP TR 25.912: “Feasibility Study for Evolved UTRA and UTRAN”.Google Scholar
  4. 4.
    3GPP TS 36.300: “Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access (E-UTRAN); Overall description; Stage 2”.Google Scholar
  5. 5.
    UTRA-UTRAN Long Term Evolution (LTE) and 3GPP System Architecture Evolution (SAE), http://www.3gpp.org/Highlights/LTE/LTE.htm.
  6. 6.
    mITF: “Mobile IT Forum 4G Mobile System Requirements Document,” Ver. 1.1.Google Scholar
  7. 7.
    3GPP TR 25.814: “Physical Layer Aspects for Evolved Universal Terrestrial Radio Access (UTRA)”.Google Scholar
  8. 8.
    .3GPP TR 33.821: “Rationale and Track of Security Decisions in Long Term Evolved RAN/3GPP System Architecture Evolution”.Google Scholar
  9. 9.
    3GPP TS 33.922: “Security Aspects for Inter-Access Mobility Between Non 3GPP and 3GPP Access Network”.Google Scholar
  10. 10.
    3GPP TR 23.401: “General Packet Radio Service (GPRS) Enhancements for Long Term Evolution (LTE) Access”.Google Scholar
  11. 11.
    3GPP TS 23.402: “3GPP System Architecture Evolution (SAE): Architecture Enhancements for Non-3GPP Accesses”.Google Scholar
  12. 12.
    3GPP TR 22.258: “Service Requirements for an All-IP Network (AIPN); Stage 1”.Google Scholar
  13. 13.
    3GPP TR 22.978: “All-IP Network (AIPN) Feasibility Study”.Google Scholar
  14. 14.
    3GPP TR 23.882: “3GPP System Architecture Evolution: Report on Technical Options and Conclusions”.Google Scholar
  15. 15.
    3GPP TR 21.902: “Evolution of 3GPP System”.Google Scholar
  16. 16.
    Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. Levkowetz, “Extensible Authentication Protocol (EAP)”, RFC 3748, June 2004.Google Scholar
  17. 17.
    IETF Handover Keying(HOKEY) working group http://www.ietf.org/ html.charters/hokey-charter.html.
  18. 18.
    J. Arkko and H. Haverinen, EAP AKA Authentication, Internet Draft draft- arkko-pppext-eap-aka-13, October 2004.Google Scholar
  19. 19.
    V. Narayanan and L. Dondeti, EAP Extensions for Efficient Re-authentication, Internet Draft, draft-vidya-eap-er-02, expires July 23, 2007.Google Scholar
  20. 20.
    IETF Protocol for carrying Authentication for Network Access working group http://www.ietf.org/html.charters/pana-charter.html.
  21. 21.
    Ashutosh Dutta, Tao Zhang, Yopshihiro Ohba, Kenichi Taniuchi, Henning Schulzrinne, “MPA assisted Optimized Proactive Handoff Scheme,” mobiqui-tous, pp. 155-165, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2005.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Anand R. Prasad
    • 1
  • Julien Laganier
    • 1
  • Alf Zugenmaier
    • 1
  • Mortaza S. Bargh
    • 2
  • Bob Hulsebosch
    • 2
  • Henk Eertink
    • 2
  • Geert Heijenk
    • 3
  • Jeroen Idserda
    • 3
  1. 1.DoCoMo Communications Labs Europe GmbHGermany
  2. 2.Telematica InstituutNetherlands
  3. 3.Twente UniversityNetherlands

Personalised recommendations