Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Req. related to Authentication

Similar presentations


Presentation on theme: "Security Req. related to Authentication"— Presentation transcript:

1 Security Req. related to Authentication
September 2002 Security Req. related to Authentication It shall be possible to prevent intruders from obtaining unauthorised access to the network by masquerading as authorised users. It shall be possible for network providers to authenticate users at any time, such as when the user first enters the network and while the user is using the network It shall be possible for the network to authenticate the origin of user traffic, signalling data and control data It shall be possible to ensure the origin, integrity and freshness of authentication data, particularly of the cipher key. It shall be possible for the user to challenge the identity of the visited network to which they are attached. It shall be possible for the user to challenge the identity of the home network to which they are attached. It shall be possible for a user to continue to authenticate via the home network Siemens Roke Manor

2 H Authentication stacks
January 2002 doc.: IEEE /xxxr0 September 2002 H Authentication stacks Siemens Roke Manor John Doe, His Company

3 HL2/HiSWANa WLAN AN Service providers net 802.11i
September 2002 GST/EAPoH EAP EAP Method EAP EAP Method Diameter IETF Transport GST/EAPoH EAP Diameter IETF Transport HL2/HiSWANa DLC/RLC DLC/RLC Phy Phy WLAN AN Service providers net AP MT Phy MAC 802.1x/EAPoL EAP EAP Method EAP EAP Method Radius IETF Transport Phy MAC 802.1x/EAPoL EAP Radius IETF Transport 802.11i Siemens Roke Manor

4 MT AP AAA HSS/ HLR HL-3G 802.11i RBCH_Association MAC ID Assignment
September 2002 MT AP AAA HSS/ HLR RBCH_Association MAC ID Assignment Link Capability Encryption Startup Identity Exchange - EAP LC & ES Validation EAP Method /Challenge Association Link Capability /ID Assignment EAP Method /Response EAP Method /Success/Failure Re-keying HL-3G 802.11i EAP Method /Response EAP Method /Success/Failure Siemens Roke Manor

5 H Link Capability Exchange
January 2002 doc.: IEEE /xxxr0 September 2002 H Link Capability Exchange Siemens Roke Manor John Doe, His Company

6 H Encryption Start Up January 2002 doc.: IEEE 802.11-02/xxxr0
September 2002 H Encryption Start Up Siemens Roke Manor John Doe, His Company

7 H Link Capability Negotiation and Encryption Startup Validation
January 2002 doc.: IEEE /xxxr0 September 2002 H Link Capability Negotiation and Encryption Startup Validation Siemens Roke Manor John Doe, His Company

8 H EAP Identity Request January 2002 doc.: IEEE 802.11-02/xxxr0
September 2002 H EAP Identity Request Siemens Roke Manor John Doe, His Company


Download ppt "Security Req. related to Authentication"

Similar presentations


Ads by Google