AAA Management in the Internet for Wireless and 3G Users

Size: px
Start display at page:

Download "AAA Management in the Internet for Wireless and 3G Users"

Transcription

1 AAA Management in the Internet for Wireless and Users Y. Rebahi FhG Fokus, Berlin, Germany D. Sisalem FhG Fokus, Berlin, Germany Abstract Today, IP based multimedia services are becoming increasingly important in wireless communications. Wireless LANs and Cellular networks are used in particular as an access mechanism to the Internet. Security was always a subject attached to the Internet connectivity. This paper provides a survey of the way of authenticating users who are requiring IP multimedia services through or technologies. It also provides the state-of-the-art of how the AAA components in the different domains interwork while keeping the communications seamless 1 Introduction Two major trends are driving the actual development in the telecommunication market: the Internet and the mobility. The Internet simply means providing cost effective data while mobility stands for reachability everywhere. The popularity of mobile devices has increased due to the technology that enables the user to connect his device to his home domain or to a visited one and gain full access to the Internet. Usually Internet Providers, offering network access or Internet services, are different and might interact to provide seamless services to the user. The AAA concept appears essentially as a response to this issue. Within the Internet Engineering Task Force (IETF), an architecture of Authentication, Authorization and Accounting (AAA) activities is defined and standardized [2], [3] and [4]. In general, a visited domain may not have enough information to authenticate a user presenting his credentials and must contact the home domain, which stores the user s profile. Thereby security associations should be settled between the home and the visited providers and should involve, in particular, the way of authenticating users, authorizing the required services and charging the consumption. To be authenticated in the Internet, a client needs to issue a request towards a AAA server using a AAA protocol such as Radius [6] or Diameter [5]. To be more precise, the user presents his Network Access Identifier (NAI) which is of the form user@ realm. The first part of the NAI identifies the user while the second one involves information regarding the home domain. The realm part will be used by the foreign domain to route the authentication request to its destination. However, in a UMTS (Universal Mobile Telecommunications System) network, a mobile subscriber needs to present his International Mobile Subscriber Identity (IMSI) to be identified. The IMSI as well as other information are contained in a Universal Subscriber Identity Modules (USIM), which is a form of a smart card. By inserting a USIM card in a UMTS terminal, the subscriber is able to initiate calls and receive calls as well as subscribed services. 2 Problem Statement technology includes high-rate data transmission and could in particular complement Cellular networks in hot spots. A GPRS or UMTS subscriber who gains access to the Internet

2 in a public place such as an airport or a hotel, will get an easy connection as well as a smooth access to the Internet services. The main challenges that might be faced in this heterogeneous environment are, to authenticate a GPRS/UMTS user when accessing a network, and on the other side, to route the billing information related to the consumption of the local services between the and the cellular network. Another issue that could be also addressed is how to manage the authorization of the services when the user is roaming between the and the network. Among the challenges mentioned above, only the authentication and the authorization activities as well as the roaming process will be treated here. As for accounting, a way to achieve it could be found in [7]. 3 Solution Proposal The solution that seems to be natural and convenient (see [7]), consists of introducing the IMSI as a part of the NAI during the authentication phase. The AAA server, to which the authentication request was addressed, will handle the routing of the request to the cellular network. In this paper, the authors propose a solution based on the idea triggered above. The AAA infrastructure that is going to be described is a part of the architecture of the Evolute s platform. This last is an all IP-based infrastructure providing multimedia services to users who access the network through or technologies. The AAA infrastructure has the following features: It assumes that the Network Provider and the Service Provider are different which is the general case in the real world. Service Providers here are for example coffee shops or malls Only one AAA server is used in this infrastructure to authenticate users and subscribers. For access, the standard IEEE 802.1x is used for authenticating and authorizing the end user. This protocol is E based. However, for a user, UMTS AKA authentication mechanism is used for granting the access to the network. AKA is used within E which allows the use of authentication mechanism in the context of s and IEEE 802.1x technology Since the access might be via a network or a network, a mixture between the NAI and the IMSI is used. The Access Credentials in this case are of the form user@realm where the attribute user involves the IMSI as mentioned in [1]. The local AAA server needs to recognize the IMSI when parsing the NAI and forward the request to the appropriate destination The requested multimedia services are controlled via SIP. To gain access, the user needs to be authenticated to the local through HTTP Digest or another authentication mechanism The Evolute s infrastructure also aims to provide seamless services when the user moves from one network to another. In this heterogeneous environment, a trust relationship is needed between the AAA servers in the home and the foreign domains. A broker might also be needed as well as Gateways for translating between different AAA protocols 3.1 Single Domain Model We mean by single domain model the case involving a user authentication against the Evolute s AAA infrastructure without moving to another network. The corresponding architecture is depicted in Figure 1 below :

3 AAA Gateway AAA server ss7 Radius/Diameter SIP Access Point 802.1x Mobile Host Figure 1: Evolute AAA Architecture In short, using the Evolute AAA architecture, a user comes into a foreign network and presents his identity using the locally supported AAA mechanisms. Based on the identity of the user, the network can decide on the home provider of the user and contact him through the AAA infrastructure. In case the home provider is using a different AAA protocols than the foreign provider then a gateway needs to be provided to translate between the two protocols. As depicted in Figure 1, a user wishing to access the services offered by the foreign network indicates its wish to use the service and gives the provider its network address identifier (NAI). This identity if forwarded from the access to the AAA server If the NAI contains an IMSI, then the access request is forwarded to a gateway that translates the AAA request into the equivalent AAA protocol request. This gateway might be pre-configured or might be dynamically searched for through some brokerage service. o The access request might then be further forwarded over SS7 signalling to another network (home network of the user). o Replies to the request are forwarded back to the user over the gateway In case the NAI does not include an IMSI then the AAA server tries to contact the home network of the user as identified by the NAI over the AAA infrastructure, i.e., either directly if a trust relation is available between the foreign and home network or through an AAA broker 3.2 Roaming Model We assume here that the end user has already gained access to the Internet through the Evolute s AAA infrastructure and wishes to move to another network. Depending on the user s home domain, two cases arise: the user may have a contract with a operator or may have an agreement with an Internet Service provider (ISP). In this scenario, a subscriber enters a network. To authenticate and authorize the user, the of the home provider needs to be contacted. This scenario is as follows, see Figure 2 (left) : The user starts its mobile device and contacts the Access Point () using the standard 802.1x The contacts the AAA server The AAA server checks the home provider of the user and contacts the AAA server of that provider. As the home provider is a provider, so it provides only a /AAA gateway The AAA/ gateway contacts the to authenticate the user

4 The authentication data go all the way back to the Access Point In case of successful AAA procedure the user gets IP access and is assigned a dynamic home agent () In case the user wants to use SIP based services, he needs to authenticate with the local SIP proxy which in turn contacts the AAA server, which contacts the AAA server of the home provider in the same way as the IP access authentication. (Note that the SIP home provider and the network home provider might be different, Figure 2 (left) assumes them to be the same) IP Network /AAA /AAA IP Netw ork Figure 2: subscriber in (left) and user roams to a network (right) In the next step, see Figure 2 (right), the user roams to a network. Here, again, the user needs to authenticate himself (we assume no direct relation between the previous wireless provider and this provider). The user contacts the AAA server, i.e. the VLR of the network using the local authentication technology (AKA UMTS) The VLR contacts the The user needs also to inform the DHR about its new position (IP address) so that all started flows would keep on running without interruption. New flows should be started with the new address so that when all the flows initiated with through the DHR are terminated the binding at the DHR can be deleted. An ISP user describes a user that has an ISP as his home provider (the ISP could be a network provider, an application provider such as yahoo or a banking entity such as VISA, the only thing that matters here is that this entity has a AAA server). In Figure 3 (left), the user starts his mobile device in a wireless LAN The user contacts the Access router using the local authentication technology (802.1x) The Access Point contacts the AAA server The AAA server checks the home provider of the user and contacts the AAA server of that provider The home AAA server sends the authentication data go all the way back to the In case of successful AAA procedure the user gets IP access and is assigned a dynamic home agent In case the user wants to use SIP based services, he needs to authenticate with the local SIP proxy which in its turn contacts the AAA server, which contacts the AAA server of the home provider in the same way as the IP access authentication. (note

5 that the SIP home provider and the IP home provider might be different, Figure 3 (left) assumes them to be the same) AAA server IP Network /AAA ISP User Home Provider ISP User Home Provider Figure 3: ISP user in a (left) and ISP user in network (right) In Figure 3 (right) the user has roamed into a network The user contacts the AAA server, i.e., VLR, of the network using the local authentication technology (AKA UMTS) The VLR contacts the of the home provider (here it is a /AAA gateway), which contacts the AAA server of the ISP. The user needs also to inform the DHR about its new position (IP address) so that all started flows would keep on running without interruption. New flows should be started with the new address so that when all the flows initiated with, through the DHR are terminated, the binding at the DHR can be deleted. References [1] J. Arkko, H. Haverinen, E AKA Authentication, Internet Draft, draft-arkkoppext-eap-aka-01, Nov 2001 [2] J. Vollbrecht, P. Calhoun, and others, AAA Authorization Framework, Internet Engineering Task Force, RFC 2904, August 2000 [3] S. Farrell, J. Vollbrecht, and others, AAA authorization requirements, Internet Engineering Task Force, RFC 2906, August 2000 [4] C. Laat, G. Gross, and others, Generic AAA Architecture, Internet Engineering Task Force, RFC 2903, August 2000 [5] P. R. Calhoun, J. Arkko, and others, Diameter Base Protocol, Internet Draft, <draft-ietf-aaa-diameter-09.txt>, March 2002 [6] Rigney, C., Willens, S., Rubens, A. and W. Simpson, "Remote Authentication Dial in User Service (RADIUS)", RFC 2865, June [7] J. Ala-Laurila, J. Mikkonen, J. Rinnemaa, Wireless LAN, Access Network Architecture for Mobile Operators, IEEE Communications Magazine, November 2001

6

Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users 1

Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users 1 Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users 1 Dorgham Sisalem Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee 31, 10589

More information

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee

More information

The SIP Express Router An Open Source SIP Platform Y. Rebahi, D. Sisalem, J. Kuthan, A. Pelinescu-Oncicul, B. Iancu, J. Janak, D. C.

The SIP Express Router An Open Source SIP Platform Y. Rebahi, D. Sisalem, J. Kuthan, A. Pelinescu-Oncicul, B. Iancu, J. Janak, D. C. The SIP Express Router An Open Source SIP Platform Y. Rebahi, D. Sisalem, J. Kuthan, A. Pelinescu-Oncicul, B. Iancu, J. Janak, D. C. Mierla Fraunhofer Institut Fokus, Kaiserin-Augusta-Allee 31, 10589 Berlin,

More information

Wireless LAN Access Network Architecture for Mobile Operators

Wireless LAN Access Network Architecture for Mobile Operators WIRELESS LOCAL AREA AND HOME NETWORKS Wireless LAN Network Architecture for Mobile Operators Juha Ala-Laurila, Jouni Mikkonen, and Jyri Rinnemaa, Nokia Mobile Phones ABSTRACT The evolution of -based office

More information

Security and Authentication Concepts

Security and Authentication Concepts Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy

More information

M E M O R A N D U M. Wireless Roaming Services for Emergency Medical Facilities

M E M O R A N D U M. Wireless Roaming Services for Emergency Medical Facilities M E M O R A N D U M TO: FROM: RE: Mr. Jim Bugel, AT&T David Robinson, Syniverse Technologies Wireless Roaming Services for Emergency Medical Facilities DATE: December 13, 2007 Automatic wireless roaming

More information

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless

More information

AAA considerations within several NEMO deployment scenarios

AAA considerations within several NEMO deployment scenarios AAA considerations within several NEMO deployment scenarios Julien Bournelle 1, Guillaume Valadon 3, David Binet 2, Saber Zrelli 4, Maryline Laurent-Maknavicius 1, and Jean-Michel Combes 2 1 GET/INT, France

More information

Authentication, Authorization and Accounting (AAA) Protocols

Authentication, Authorization and Accounting (AAA) Protocols Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian babak.shafieian@dai-labor.de 10.06.2009 Agententechnologien

More information

Authentication and Security in IP based Multi Hop Networks

Authentication and Security in IP based Multi Hop Networks 7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

Interworking Security in Heterogeneous Wireless IP Networks

Interworking Security in Heterogeneous Wireless IP Networks Interworking Security in Heterogeneous Wireless IP Networks Wenhui Zhang University of Stuttgart, Institute of Communication Networks and Computer Engineering IKR, Pfaffenwaldring 47, D-70569 Stuttgart,

More information

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address

More information

SIP Roaming Server Product Overview. Mobile Convergence Technology

SIP Roaming Server Product Overview. Mobile Convergence Technology SIP Roaming Server Product Overview Mobile Convergence Technology CONNECTING NETW ORKS Roam, Talk and Text (without a Mobile Network) By interworking with existing communications infrastructures, Session

More information

3GPP TS 29.161 V6.3.0 (2007-12)

3GPP TS 29.161 V6.3.0 (2007-12) TS 29.161 V6.3.0 (2007-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Interworking between the Public Land Mobile Network (PLMN)

More information

A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS

A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS Azita Laily Yusof, Mahamod Ismail, Norbahiah Misran Dept of Electrical, Electronic & System Engineering, Universiti Kebangsaan

More information

SOLUTIONS FOR ROAMING AND INTEROPERABILITY PROBLEMS BETWEEN LTE AND 2G OR 3G NETWORKS

SOLUTIONS FOR ROAMING AND INTEROPERABILITY PROBLEMS BETWEEN LTE AND 2G OR 3G NETWORKS Review of the Air Force Academy No 2 (24) 2013 SOLUTIONS FOR ROAMING AND INTEROPERABILITY PROBLEMS BETWEEN LTE AND 2G OR 3G NETWORKS Radu CURPEN, Florin SANDU, Cosmin COSTACHE, Gabriel Mihail DANCIU Transilvania

More information

A Call Conference Room Interception Attack and its Detection

A Call Conference Room Interception Attack and its Detection A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com

More information

A Novel Distributed Wireless VoIP Server Based on SIP

A Novel Distributed Wireless VoIP Server Based on SIP A Novel Distributed Wireless VoIP Server Based on SIP Yuebin Bai 1,Syed Aminullah 1, Qingmian Han 2, Ding Wang 1, Tan Zhang 1,and Depei Qian 1 1 (School of Computer Science and Engineering, Beihang University,

More information

IMS Interconnect: Peering, Roaming and Security Part One

IMS Interconnect: Peering, Roaming and Security Part One T E C H N O L O G Y W H I T E P A P E R IMS Interconnect: Peering, Roaming and Security Part One IMS interconnection promises to enable greater reach and richer offerings for the providers that establish

More information

Mobile SCTP Transport Layer Mobility Management for the Internet

Mobile SCTP Transport Layer Mobility Management for the Internet Mobile SCTP Transport Layer Mobility Management for the Maximilian Riegel Siemens AG, Munich, Germany E-mail: maximilian.riegel@icn.siemens.de Dr. Michael Tüxen Siemens AG, Munich, Germany E-mail: michael.tuexen@icn.siemens.de

More information

White Paper. Mobility and Mobile IP, Introduction. Abstract

White Paper. Mobility and Mobile IP, Introduction. Abstract Doc Number: IPU-2001:0002, Rev C White Paper Mobility and Mobile IP, Introduction Abstract This white paper introduces networking with Mobile IP and related functionality. In particular the paper describes

More information

SIP: Ringing Timer Support for INVITE Client Transaction

SIP: Ringing Timer Support for INVITE Client Transaction SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna (poojan@motorola.com) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone

More information

Peer-to-Peer SIP Mode with FXS and FXO Gateways

Peer-to-Peer SIP Mode with FXS and FXO Gateways Peer-to-Peer SIP Mode with FXS and FXO Gateways New Rock s SIP based VoIP gateways with FXS and FXO ports support peer-to-peer mode which has many applications in deploying enterprise multi-site telephone

More information

End-2-End QoS Provisioning in UMTS networks

End-2-End QoS Provisioning in UMTS networks End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS Implementing roaming for OpenBTS 1 Introduction One of the main advantages of OpenBTS TM system architecture is absence of a legacy GSM core network. SIP is used for registering, call control and messaging.

More information

VoIP and CLI. Trusted Identification. RIPE 46 VoIP and ENUM Tutorial 1. September 2003. Richard STASTNY

VoIP and CLI. Trusted Identification. RIPE 46 VoIP and ENUM Tutorial 1. September 2003. Richard STASTNY VoIP and CLI Trusted Identification RIPE 46 VoIP and ENUM Tutorial 1. September 2003 Richard STASTNY ÖFEG/TELEKOM AUSTRIA, Postbox 147, 1103-Vienna enum:+43 664 420 4100 E-Mail: richard.stastny@oefeg.at

More information

Reduce Mobile Phone Expense with Avaya Unified Communications

Reduce Mobile Phone Expense with Avaya Unified Communications Reduce Mobile Phone Expense with Avaya Unified Communications Table of Contents Section 1: Reduce Inbound Minutes... 2 Section 2: Reduce Outbound Minutes... 3 Section 3: Take Greater Advantage of Free

More information

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National

More information

Technical White Paper

Technical White Paper Instant APN Technical White Paper Introduction AccessMyLan Instant APN is a hosted service that provides access to a company network via an Access Point Name (APN) on the AT&T mobile network. Any device

More information

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Application Note EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Introduction The demand for wireless LAN (WLAN) access to the public IP network is growing rapidly. It is only

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Wi3GTalk: Fixed-mobile convergence

Wi3GTalk: Fixed-mobile convergence Wi3GTalk: Fixed-mobile convergence 1. Introduction Freecoms has developed a solution for fixed-mobile convergence. The basic feature of the solution is the seamless (with no call interruption and no intervention

More information

Security considerations for IMS access independence

Security considerations for IMS access independence 3GPP TSG SA WG3 Security S3#20 S3-010468 16-19 October, 2001 Sydney, Australia Source: Title: Document for: Agenda Item: Telia / independence Information Security Security considerations for access independence

More information

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic

More information

Wireless Internet access has recently gained

Wireless Internet access has recently gained IP MULTIMEDIA IN N EXT-GENERATION MOBILE N ETWORKS: SERVICES, PROTOCOLS, AND T ECHNOLOGIES MOBILITY MANAGEMENT FOR VOIP SERVICE: MOBILE IP VS. SIP TED TAEKYOUNG KWON AND MARIO GERLA, UCLA SAJAL DAS, UNIVERSITY

More information

Network Security. Chapter 14. Security Aspects of Mobile Communications

Network Security. Chapter 14. Security Aspects of Mobile Communications Network Security Chapter 14 Security Aspects of Mobile Communications Network Security (WS 2002): 14 Security Aspects of Mobile Communications 1 Security Aspects of Mobile Communication Mobile communication

More information

Toolkit for vulnerability assessment in 3G networks. Kameswari Kotapati The Pennsylvania State University University Park PA 16802

Toolkit for vulnerability assessment in 3G networks. Kameswari Kotapati The Pennsylvania State University University Park PA 16802 Toolkit for vulnerability assessment in 3G networks Kameswari Kotapati The Pennsylvania State University University Park PA 16802 Contents Motivation Solution Overview Methodology Overview 3G Attack Graph

More information

Whitepaper Mobile Enterprise. The path to the Mobile Enterprise

Whitepaper Mobile Enterprise. The path to the Mobile Enterprise Whitepaper Mobile Enterprise The path to the Mobile Enterprise 1 Executive summary At Ericsson, we are in a unique position to help enterprises achieve a truly mobile way of working. This involves providing

More information

Mobility Management Alternatives for Migration to Mobile Internet Session-Based Services

Mobility Management Alternatives for Migration to Mobile Internet Session-Based Services 1 Mobility Management Alternatives for Migration to Mobile Internet Session-Based Services Kazutaka Murakami 1, Oliver Haase 1, JaeSheung Shin 2, and Thomas F. La Porta 2, 1 Bell Labs Research, Lucent

More information

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network Girish Patel Wireless Solutions Nortel Networks Richardson, TX grpatel@nortelnetworks.com Steven Dennett Personal Communications Sector Motorola

More information

Bridging the gap between peer-to-peer and conventional SIP networks

Bridging the gap between peer-to-peer and conventional SIP networks 1 Bridging the gap between peer-to-peer and conventional SIP networks Mosiuoa Tsietsi, Alfredo Terzoli, George Wells Department of Computer Science Grahamstown, South Africa Tel: +27 46 603 8291 hezekiah@rucus.ru.ac.za

More information

MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS

MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS MOBILITY SUPPORT USING INTELLIGENT USER SADOWS FOR NEXT-GENERATION WIRELESS NETWORKS Gergely V. Záruba, Wei Wu, Mohan J. Kumar, Sajal K. Das enter for Research in Wireless Mobility and Networking Department

More information

An Architectural Framework for Providing WLAN Roaming

An Architectural Framework for Providing WLAN Roaming An Architectural Framework for Providing WLAN Roaming D.Vassis, G.Kormentzas Dept. of Information and Communication Systems Engineering University of the Aegean GR-83200, Karlovassi, GREECE emails:{divas;

More information

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)

More information

U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD

U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD [0001] The disclosure relates to mobile networks and, more specifically, to wireless

More information

CS Fallback Function for Combined LTE and 3G Circuit Switched Services

CS Fallback Function for Combined LTE and 3G Circuit Switched Services EPC Voice over Circuit Switched Services Special Articles on SAE Standardization Technology CS Fallback Function for Combined and Circuit Switched Services The PP, an international standardization body

More information

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements Mar 3,2005 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and

More information

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : Nick.Marly@alcatel.be Tel : (+32)

More information

The Shift to Wireless Data Communication

The Shift to Wireless Data Communication The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial

More information

Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670

Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670 Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670 Businesses Save Money with Toshiba s New SIP Trunking Feature Unlike gateway based solutions, Toshiba s MIPU/ GIPU8 card

More information

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility) Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol

More information

A Proposed Model For QoS guarantee In IMSbased Video Conference services

A Proposed Model For QoS guarantee In IMSbased Video Conference services International Journal of Intelligent Information Technology Application, 2009, 2(5):243-249 A Proposed Model For QoS guarantee In IMSbased Video Conference services Maryam Kiani Department of Electrical

More information

ETSI TS 129 161 V10.0.1 (2011-04) Technical Specification

ETSI TS 129 161 V10.0.1 (2011-04) Technical Specification TS 129 161 V10.0.1 (2011-04) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Interworking between the Public Land Mobile Network (PLMN) supporting packet based services

More information

Mobile@Home GSM services over wireless LAN

Mobile@Home GSM services over wireless LAN Mobile@Home GSM services over wireless LAN Martin Bäckström, Andreas Havdrup, Tomas Nylander, Jari Vikberg and Peter Öhman What do you get when you combine mobile telephony with voice over IP (VoIP)? Mobile@Home.

More information

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM Evelina Nicolova Pencheva, Vessela Liubomirova Georgieva Department of telecommunications, Technical University of Sofia, 7 Kliment Ohridski St.,

More information

3GPP TR 23.981 V6.4.0 (2005-09)

3GPP TR 23.981 V6.4.0 (2005-09) TR 23.981 V6.4.0 (2005-09) Technical Report 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Interworking aspects and migration scenarios for based IMS Implementations

More information

B Series Personal Notification via SMS and Email

B Series Personal Notification via SMS and Email Security Systems Abstract B Series Personal Notification via SMS and Email White Paper The Bosch B Series control panel version 2.00 introduced the ability for end users of the system to receive emails

More information

Advanced SIP Series: SIP and 3GPP Operations

Advanced SIP Series: SIP and 3GPP Operations Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.

More information

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Draft Recommendation Q.3902 PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Summary This Recommendation describes the main

More information

7 SIP (II) Call flow for basic call scenario In the case of registration and finding the SIP user Collecting the bill Multiparty conferencing with SIP

7 SIP (II) Call flow for basic call scenario In the case of registration and finding the SIP user Collecting the bill Multiparty conferencing with SIP Burapha University ก Department of Computer Science 7 SIP (II) Call flow for basic call scenario In the case of registration and finding the SIP user Collecting the bill Multiparty conferencing with SIP

More information

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,

More information

Home Agent placement and assignment in WLAN with Cellular Networks

Home Agent placement and assignment in WLAN with Cellular Networks Home Agent placement and assignment in WLAN with Cellular Networks Selvakumar.R, Senior Lecturer, Department of Computer Science and Engineering V.M.K.V.Engineering College, Salem-636 308 Tamilnadu, India.

More information

Mobility Growth Subscribers, Handsets. Erosion and Opportunities. Scenario and Problems. AAA Architecture and Weaknesses

Mobility Growth Subscribers, Handsets. Erosion and Opportunities. Scenario and Problems. AAA Architecture and Weaknesses October 28-30, 2002, Dagstuhl Seminars in Networks and Distributed Systems Mobility Growth Subscribers, Handsets ing and in the A x Architecture Burkhard Stiller Information Systems Laboratory IIS, University

More information

Mobile Application Part protocol implementation in OPNET

Mobile Application Part protocol implementation in OPNET Mobile Application Part protocol implementation in OPNET Vladimir Vukadinovic and Ljiljana Trajkovic School of Engineering Science Simon Fraser University Vancouver, BC, Canada E-mail: {vladimir, ljilja}@cs.sfu.ca

More information

SMS Roaming Service and SMS Interworking Service

SMS Roaming Service and SMS Interworking Service SMS Roaming Service and SMS Interworking Service Takuya Shinozaki, Etsuko Matsubara, Masahiro Kadono and Mayumi Takahashi DoCoMo s SMS Roaming Service and SMS Interworking Service have been launched. It

More information

3GPP TS 33.220 V6.13.0 (2007-06)

3GPP TS 33.220 V6.13.0 (2007-06) TS 33.220 V6.13.0 (2007-06) Technical Specification The present document has been developed within the 3 rd Generation Partnership Project ( TM ) and may be further elaborated for the purposes of. The

More information

802.11: Mobility Within Same Subnet

802.11: Mobility Within Same Subnet What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple

More information

Need for Signaling and Call Control

Need for Signaling and Call Control Need for Signaling and Call Control VoIP Signaling In a traditional voice network, call establishment, progress, and termination are managed by interpreting and propagating signals. Transporting voice

More information

Cisco Home Agent Service Manager 4.1

Cisco Home Agent Service Manager 4.1 Datasheet Cisco Home Agent Service Manager 4.1 PRODUCT OVERVIEW Cisco Systems announces the availability of Cisco Home Agent Service Manager 4.1 for configuring and troubleshooting Cisco Home Agent. As

More information

VPN Technologies: Definitions and Requirements

VPN Technologies: Definitions and Requirements VPN Technologies: Definitions and Requirements 1. Introduction VPN Consortium, January 2003 This white paper describes the major technologies for virtual private networks (VPNs) used today on the Internet.

More information

Diameter in the Evolved Packet Core

Diameter in the Evolved Packet Core Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

Designing a Wireless Broadband IP System with QoS Guarantees

Designing a Wireless Broadband IP System with QoS Guarantees Designing a Wireless Broadband IP System with QoS Guarantees Juha Ala-Laurila 1, Lorraine Stacey 2, Neda Nikaein 3, Jukka Seppälä 4 1,4 Nokia Mobile Phones, P.O. Box 68, FIN-33721, Tampere, Finland email:

More information

Mobile Access by Axis. Wireless Access Points

Mobile Access by Axis. Wireless Access Points Mobile Access by Axis Wireless Access Points Mobile Internet: Unleashing the Power of Bluetooth Bluetooth Access Point: Going Beyond Cables There s a revolution taking shape today that s fundamentally

More information

3GPP TSG CN Plenary Meeting #16 5 th - 7 th June 2002. Marco Island, USA. 3GPP TSG-CN1 Meeting #24 Tdoc N1-021455 Budapest, Hungary, 13. 17.

3GPP TSG CN Plenary Meeting #16 5 th - 7 th June 2002. Marco Island, USA. 3GPP TSG-CN1 Meeting #24 Tdoc N1-021455 Budapest, Hungary, 13. 17. 3GPP TSG CN Plenary Meeting #16 5 th - 7 th June 2002. Marco Island, USA. NP-020155 Title: Liaison Statement on 3GPP Network Domain Name usage for IMS Source: CN1 Agenda item: 5.1 Document for: INFORMATION

More information

LAN TCP/IP and DHCP Setup

LAN TCP/IP and DHCP Setup CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are

More information

SA Oxford Workshop Summary to T#10 Bangkok, 6-8 December 2000

SA Oxford Workshop Summary to T#10 Bangkok, 6-8 December 2000 SA Oxford Workshop Summary to T#10 Bangkok, 6-8 December 2000 TSG-T Vice Chairman: Kevin Holley, BT Wireless TP-000199 Agenda Background to meeting Presentation Summary Terminals Presentation from BT Next

More information

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chih-Yuan Lee Department of CSIE National Taipei University 1 Outline Abstract Introduction Background System

More information

SIP, Session Initiation Protocol used in VoIP

SIP, Session Initiation Protocol used in VoIP SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1

More information

Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice. 2005-05-11 Upperside WiFi Voice 2005

Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice. 2005-05-11 Upperside WiFi Voice 2005 Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice 2005-05-11 Upperside WiFi Voice 2005 Jörg Ott Dirk Kutscher jo@netlab.hut.fi dku@tzi.org 2005

More information

Continued improvement in semiconductor and computing. technologies brought exponential growth to wireless industry. The

Continued improvement in semiconductor and computing. technologies brought exponential growth to wireless industry. The 23 Chapter-1 INTRODUCTION Continued improvement in semiconductor and computing technologies brought exponential growth to wireless industry. The huge number of advance mobile devices and integrated applications

More information

Com.X Router/Firewall Module. Use Cases. White Paper. Version 1.0, 21 May 2014. 2014 Far South Networks

Com.X Router/Firewall Module. Use Cases. White Paper. Version 1.0, 21 May 2014. 2014 Far South Networks Com.X Router/Firewall Module Use Cases White Paper Version 1.0, 21 May 2014 2014 Far South Networks Document History Version Date Description of Changes 1.0 2014/05/21 Preliminary 2014 Far South Networks

More information

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture

More information

3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany

3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany 3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany Title: Response to: Source: To: Cc: Liaison on HTTP Security investigation within IMS LS S3-020475 (S2-022609) on Liaison on Security

More information

Operation Manual Voice Overview (Voice Volume) Table of Contents

Operation Manual Voice Overview (Voice Volume) Table of Contents Operation Manual Voice Over (Voice Volume) Table of Contents Table of Contents Chapter 1 Voice Over... 1-1 1.1 Introduction to VoIP... 1-1 1.1.1 VoIP System... 1-1 1.1.2 Basic VoIP Call Flow... 1-2 1.1.3

More information

Evolutionary Trends towards Beyond 3G Mobile Networks

Evolutionary Trends towards Beyond 3G Mobile Networks Evolutionary Trends towards Beyond 3G Mobile Networks Cornel Pampu, Cornelia Kappler, Morten Schläger / SN MN PG NT MN 4 November 17th, 2006 The new company Nokia Siemens Networks is expected to start

More information

Requirements and Service Scenarios for QoS enabled Mobile VoIP Service

Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Kyu Ouk Lee, Ho Young Song Electronics and Telecommunications Research Institute (ETRI) kolee@etri.re.kr, hsong@etri.re.kr Abstract.

More information

Mobility Management Advanced

Mobility Management Advanced Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model

More information

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC: Why and How? FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This docume nt is copyright of FRAFOS GmbH. Duplication or propagation or e xtracts

More information

End Device Support for AAA in SIP Conferencing

End Device Support for AAA in SIP Conferencing End Device Support for AAA in SIP Conferencing Antti Poikela Helsinki University of Technology aspoikel@cc.hut.fi Abstract This study is a literature survey of current problems and solutions for authentication,

More information

A SEAMLESS MOBILE VPN DATA SOLUTION FOR UMTS AND WLAN USERS

A SEAMLESS MOBILE VPN DATA SOLUTION FOR UMTS AND WLAN USERS A SEAMLESS MOBILE VPN DATA SOLUTION FOR AND USERS P M Feder, N Y Lee, S Martin-Leon Bell Laboratories - Mobility Solutions, Lucent Technologies Inc., USA, UK Abstract Mobile virtual private networks (MVPNs)

More information

Mobility Management Framework in Software Defined Networks

Mobility Management Framework in Software Defined Networks , pp. 1-10 http://dx.doi.org/10.14257/ijseia.2014.8.8,01 Mobility Management Framework in Software Defined Networks Kyoung-Hee Lee Department of Computer Engineering, Pai Chai University, Korea leekhe@pcu.ac.kr

More information

VOICE SERVICES FOR PSTN AND IP NETWORKS

VOICE SERVICES FOR PSTN AND IP NETWORKS VOICE SERVICES FOR PSTN AND IP NETWORKS Qi Guan SIEMENS AG Austria Siemensstra,Pe 88-92, A-I210 Vienna, Austria Key words: Abstract: Voice over IP, VoIP, Services, PSTN This paper presents an architecture

More information