Secure Service and Network Framework for Mobile Ethernet

  • Authors:
  • Masahiro Kuroda;Mariko Yoshida;Ryoji Ono;Shinsaku Kiyomoto;Toshiaki Tanaka

  • Affiliations:
  • National Institute of Information and Communications Technology, 3-4 Hikarino-oka, Yokosuka, Kanagawa 239-0847, Japan. marsh@nict.go.jp;National Institute of Information and Communications Technology, 3-4 Hikarino-oka, Yokosuka, Kanagawa 239-0847, Japan/ Mitsubishi Electric Corporation, 5-1-1 Ofuna, Kamakura, Kanagawa 247-8501, Ja ...;Mitsubishi Electric Corporation, 5-1-1 Ofuna, Kamakura, Kanagawa 247-8501, Japan;KDDI R&/D Laboratories Inc., 2-1-15 Ohara, Kamifukuoka, Saitama 356-8502, Japan;KDDI R&/D Laboratories Inc., 2-1-15 Ohara, Kamifukuoka, Saitama 356-8502, Japan

  • Venue:
  • Wireless Personal Communications: An International Journal
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Secure cellular data services have become more popular in the Japanese market. These services are based on 2G/3G cellular networks and are expected to move into the next-generation wireless networks, called Beyond 3G. In the Beyond 3G, wireless communication available at a user's location is selected based on the type of the service. The user downloads an application from one wireless network and executes it on another. Beyond 3G expects core and wireless operators and allows to plug-in new wireless access. A security model that can accommodate these requirements needs to be sufficiently flexible for end users to utilize with ease. In this paper, we explain the Mobile Ethernet architecture for all IP networks in terms of the Beyond 3G. We discuss usage scenario/operator models and identify entities for the security model. We separate a mobile device into a personal identity card (PIC) containing cryptographic information and a wireless communications device that offers security and flexibility. We propose a self-delegation protocol for device authentication and use a delegated credential for unified network- and service-level authentication. We also propose proactive handover authentication using the security context between different types of wireless access, such as Third Generation Partnership Project (3GPP) and WLAN, so that the secure end-to-end communication channels established by service software on the TCP/IP are not terminated. Lastly, we raise security issues regarding the next-generation platform.