摘要:
A method is provided for securing a PMIP tunnel between a serving gateway and a new access node through which an access terminal communicates. A PMIP key hierarchy unique to each access terminal is maintained by the gateway. The gateway uses a first node key to secure PMIP tunnels when authentication of the access terminal has been performed. A PMIP key is generated based on the first node key and the PMIP key is sent to the new access node to assist in establishing and securing a PMIP tunnel between the gateway and the new access node. Otherwise, when authentication of the access terminal has not been performed, the gateway generates a second node key and sends it to an intermediary network node which then generates and sends a PMIP key to the new access node. This second key is then used to secure the PMIP tunnel.
摘要:
Disclosed is a method for multiple EAP-based authentications in a wireless communication system. In the method, a first master session key (MSK) is generated in a first EAP-based authentication for a first-type access. A first temporal session key (TSK) is generated from the first master session key (MSK). A second EAP-based authentication is performed, using the first temporal session key (TSK), for a second-type access. First-type access and second-type access are provided after the first and second EAP-based authentications are successfully completed.
摘要:
A method is provided for securing a PMIP tunnel between a serving gateway and a new access node through which an access terminal communicates. A PMIP key hierarchy unique to each access terminal is maintained by the gateway. The gateway uses a first node key to secure PMIP tunnels when authentication of the access terminal has been performed. A PMIP key is generated based on the first node key and the PMIP key is sent to the new access node to assist in establishing and securing a PMIP tunnel between the gateway and the new access node. Otherwise, when authentication of the access terminal has not been performed, the gateway generates a second node key and sends it to an intermediary network node which then generates and sends a PMIP key to the new access node. This second key is then used to secure the PMIP tunnel.
摘要:
Disclosed is a method for multiple EAP-based authentications in a wireless communication system. In the method, a first master session key (MSK) is generated in a first EAP-based authentication for a first-type access. A first temporal session key (TSK) is generated from the first master session key (MSK). A second EAP-based authentication is performed, using the first temporal session key (TSK), for a second-type access. First-type access and second-type access are provided after the first and second EAP-based authentications are successfully completed.
摘要:
A method for implementing proxy mobile Internet protocol (PMIP) in mobile IP foreign agent care-of-address mode may include determining a home address of an access terminal. The method may also include communicating with a home agent in order to bind an address of the network node with the home address of the access terminal and establish a tunnel between the network node and the home agent. The method may also include receiving first packets destined for the access terminal from the home agent via the tunnel and sending the first packets to the access terminal. The method may also include receiving second packets sent by the access terminal that are destined for a correspondent node and sending the second packets to the home agent via the tunnel.
摘要:
A method for implementing proxy mobile Internet protocol (PMIP) in mobile IP foreign agent care-of-address mode may include determining a home address of an access terminal. The method may also include communicating with a home agent in order to bind an address of the network node with the home address of the access terminal and establish a tunnel between the network node and the home agent. The method may also include receiving first packets destined for the access terminal from the home agent via the tunnel and sending the first packets to the access terminal. The method may also include receiving second packets sent by the access terminal that are destined for a correspondent node and sending the second packets to the home agent via the tunnel.
摘要:
In a converged communication network, IP data packet services are provided by a core network to access terminals via radio access nodes (RAN). By positioning accounting report triggering closer to the usage, accuracy and comprehensive of accounting is achieved, which can also reduce overhead burdens on the core network. Additional responsibility is given to an access gateway (AGW) between an enhanced base station (eBS) of the RAN and the core network that can reduce the volume and increase the accuracy of accounting message traffic to an authentication, authorization and accounting (AAA) server of the core network. The AGW informs the eBS of accounting rules to be used in making air link records that are merged and formatted in accordance with an accounting protocol for sending to the AAA server, to address duration and volume based accounting needs, postpaid and prepaid accounting types, and user, service and flow based accounting categories.
摘要:
A method for resource management in a communication network may include monitoring whether a Proxy Mobile Internet Protocol (PMIP) tunnel between a network entity and another network entity is still needed. The method may also include detecting an event which indicates that the PMIP tunnel is no longer needed. The method may also include cleaning resources of the network entity that support the PMIP tunnel.
摘要:
In a converged communication network, IP data packet services are provided by a core network to access terminals via radio access nodes (RAN). By positioning accounting report triggering closer to the usage, accuracy and comprehensive of accounting is achieved, which can also reduce overhead burdens on the core network. Additional responsibility is given to an access gateway (AGW) between an enhanced base station (eBS) of the RAN and the core network that can reduce the volume and increase the accuracy of accounting message traffic to an authentication, authorization and accounting (AAA) server of the core network. The AGW informs the eBS of accounting rules to be used in making air link records that are merged and formatted in accordance with an accounting protocol for sending to the AAA server, to address duration and volume based accounting needs, postpaid and prepaid accounting types, and user, service and flow based accounting categories.
摘要:
A novel group key distribution and management scheme for broadcast message security is provided that allows an access terminal to send a single copy of a broadcast message encrypted with a group key. Access nodes that are members of an active set of access nodes for the access terminal may decrypt and understand the message. The group key is generated and distributed by the access terminal to the access nodes in its active set using temporary unicast keys to secure the group key during distribution. A new group key is provided every time an access node is removed from the active set of access nodes for the access terminal.