unlicensed mobile access (uma) dasun weerasinghe school of engineering and mathematical sciences...
TRANSCRIPT
![Page 1: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/1.jpg)
Unlicensed Mobile Access (UMA)
Dasun Weerasinghe
School of Engineering and Mathematical Sciences
City University
London
![Page 2: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/2.jpg)
Agenda
What is UMA
UMA Architecture
Security in UMAAuthentication
Encryption
EAP-AKA Authentication
Future Work
![Page 3: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/3.jpg)
What is UMA
UMA allows to access the mobile voice and data services of the cellular network over a Wireless LAN
Subscribers are enabled to roam and handover between cellular networks and wireless networks
UMA Technology specification was published in September 2004
3GPP approved the specification as “Generic Access to A/Gb interfaces”
Pilot project by Nokia in Finland
![Page 4: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/4.jpg)
What is UMA ( Contd..)
![Page 5: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/5.jpg)
UMA Architecture
Mobile devices access the Core Network through Unlicensed Mobile Access Network (UMAN).
UMAN has 3 major entities Unlicensed wireless network
IP access network
UMA Network controller (UNC)
UNC authorizes and authenticates the Mobile devices for accessing the Core Network
![Page 6: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/6.jpg)
UMA Architecture ( Contd..)
![Page 7: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/7.jpg)
UMA Security
Authentication Authenticate MS with UNC to make secure tunnel
Based GSM or UMTS credentials
Protocol of authentication is IKEv2
GSM : EAP-SIM or UMTS : EAP-AKA
Mutual Authentication of MS and Mobile Network
Session Key Generation – IK and CK
![Page 8: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/8.jpg)
UMA Security – EAP Authentication
Steps in Authentication ( EAP )MS establish a link with AP
Determines the UNC to be connected
Initiate the connection with UNC with IKE
UNC connects with the local AAA
![Page 9: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/9.jpg)
UMA Security - EAP Authentication (Contd..)
Local AAA linked to the Home AAA
EAP procedure is performed between MS and AAA
UNC is a relay for EAP messages
![Page 10: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/10.jpg)
EAP-AKA
![Page 11: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/11.jpg)
EAP-AKA steps
MS finds an AP
MS finds the UNC-SGW and initiates the IKEv2 authentication procedure
MS sends to NAI to UNC-SGW which contains IMSI
UNC-SGW communicates with local AAA
Local server determines the Home AAA by using the NAI. Routing path may include several AAA proxies
Leading digits in NAI indicates the authentication procedure is EAP - AKA
![Page 12: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/12.jpg)
EAP-AKA steps ( contd..)
AAA requests the user profile and UMTS authentication vectors from HSS
UMTS authentication vector consists with RAND, authentication part (AUTH), expected result, IK and CK
AAA send the EAP Request/AKA Challenge to UNC-SGW with RAND, AUTH, MAC ( message authentication key ) and re-authentication identity.
UNG-SGW forwards the EAP Request/AKA Challenge to MA
![Page 13: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/13.jpg)
EAP-AKA steps ( contd..)
MS runs the UMTS algorithm and verifies the AUTH. It computes the RES, IK, CK and calculates MAC using the generated IK and CKMS sends EAP Response/AKA Challenge with RES and MACAAA verifies the received MAC and compares RES with XRESAAA sends IK and CK to UNC-SGW for the communication with MSUNC-SGW informs the successful authentication to MS
![Page 14: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/14.jpg)
EAP-AKA Fast Re-Authentication
Used to reduce the network load due to the authentication
AAA server authenticates the user based on the keys derived by the last full authentication
Re-authentication ID is generated by the AAA in the full authentication process
![Page 15: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/15.jpg)
EAP-AKA Fast Re-Authentication (Contd..)
![Page 16: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/16.jpg)
EAP-AKA Fast Re-Authentication StepsMS initiates the IKEv2 authentication procedure
Re-Authentication identity is sent to the UNC-SGWUNC-SGW sends EAP Response/Identity to AAA with re-authentication Id AAA initiates a counter and sends EAP Request/AKA-Reauthentication message with counter value, MAC and re-authentication id for the next fast authentication.MS verifies the counter value and the MAC and send the EAP Response/AKA-Reauthentication with the same counter value and calculated MAC.AAA server verifies the counter value and MACEAP success message is sent to MS
![Page 17: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/17.jpg)
Encryption
CK is generated during the authentication process
Negotiated cryptographic algorithms are used.
![Page 18: Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London](https://reader035.vdocuments.us/reader035/viewer/2022062511/551b202a5503462e578b6291/html5/thumbnails/18.jpg)
Future Work
Calls handing off between the cellular network and the wireless LAN with fast authentication processSSO from one UNC to another Introduce UNC to the Mobile Shopping Mall. UNC can be a web service. Introduce XML security to the communication between MS and UNCAuthentication of the UNC to the networkSome security holes in Fast authentication