70 likes | 317 Views
cdma2000-WLAN Interworking. Jim Tomcik (jtomcik@qualcomm.com) Raymond Hsu (rhsu@qualcomm.com) November, 2004 San Antonio, TX. Objectives. Phase-1 Objectives Scenario 1: Common billing (scenario 1) No 3GPP2 specification work needed
E N D
cdma2000-WLAN Interworking Jim Tomcik (jtomcik@qualcomm.com) Raymond Hsu (rhsu@qualcomm.com) November, 2004 San Antonio, TX Jim Tomcik
Objectives • Phase-1 Objectives • Scenario 1: Common billing (scenario 1) • No 3GPP2 specification work needed • Scenario 2: 3GPP2-based access control, direct Internet access, and accounting • Common root key (A-key or MN-AAA key) for both WLAN & cdma2000 authentication • Direct Internet access from WLAN system • WLAN accounting available to home cdma2000 operator • Phase-2 Objectives • Scenario 3: Access to home cdma2000 system from WLAN system • e.g. Access to IMS, WAP, MMS in the home system • Via tunneling between WLAN and cdma2000 systems • Scenario 4: Session continuity • Maintain IP connectivity while moving between cdma2000 and WLAN systems Jim Tomcik
Status • Phase-1 Status (X.S0028) • Finished R&F (“Review and Freeze”) • Currently in V&V (“Verification and Validation”) • Publication in 1Q/2005 • Phase-2 Status • No work-plan yet • High-level discussion has started in the Oct. 3GPP2 meeting Jim Tomcik
Phase-1 Architecture Jim Tomcik
Some Phase-1 Detail • SSID for system selection • SSID may be used to identify the serving WLAN system, or a home CDMA2000 system that has roaming agreement with the serving WLAN system • MS is configured with a list of preferred SSIDs • MS uses passive scan or active scan to obtain available SSIDs • WLAN access authentication key (WKEY) • WKEY may be generated from a CDMA2000 root key (e.g., A-key, MN-AAA key) • Why? Cryptographic separation - if WKEY is compromised, the root key is still safe • An alternative approach is to pre-configure the MS with a separate WKEY • MS uses (R)UIM procedures (IS-820) to bootstrap WKEY • If A-key is used as the root key, WKEY is derived from the SMEKEY • If MN-AAA key is used as the root key, WKEY is derived from the MN-AAA authenticator • EAP is used to exchange key materials between MS and home AAA for bootstrapping WKEY • If A-key is used as the root key, home AAA interface with HLR/AC to SMEKEY Jim Tomcik
Some Phase-1 Detail • WLAN access authentication • WKEY is used as the secret for authentication • Two EAP authentication methods are allowed: • EAP-AKA • EAP-TLS with Pre-Shared Key (PSK) • IEEE 802.11i for Privacy protection in WLAN system • If MS is authenticated, MS and home AAA derive Pairwise-Master Key (PMK) • Home AAA distributes the PMK to the AP serving the MS • MS and AP use the PMK to derive session keys for privacy protection • Internet access via WLAN system directly • If MS is authenticated, WLAN system assigns an IP address • Not require to traverse through the home CDMA2000 system • WLAN accounting sent to home CDMA2000 system • Standard IETF RADIUS attributes • No 3GPP2 vendor-specific attributes Jim Tomcik
EAP-AKAMessageFlows Jim Tomcik