Cellular Access Control and Charging for Mobile Operator
Cellular Access Control and Charging for Mobile Operator Wireless Local Area Networks H. Haverinen, J. Mikkonen and T. Takamaki, Nokia Wei-Jen, Lin Advanced Network Technology Lab. Institute of Communications Engineering National Chung Cheng University foolfish@ant. comm. ccu. edu. tw
Outline • • • Introduction Other Solutions Architecture Authentication Protocol User Identity Format Authentication in GSM Authentication and Roaming Subscriber Identity Privacy Accounting and Billing System Implementation Conclusions
Introduction • Reusing GSM and GPRS mechanisms for user authentication, access control, subscriber management, operator roaming, and billing. • Compatible with RADIUS、EAP, IEEE 802. 1 x and IEEE 802. 11 i. • WLAN service provider is a cellular operator. • SIM-based/RADIUS-based Authentication. • The first public WLAN solutions only provide for internet or intranet connectivity.
Other Solutions Reusing GPRS mobility management message. The user’s active GPRS sessions could be transferred to WLAN.
Architecture IP Network SS 7 Network Authentication Server (AAA Server) RADIUS Proxy Charging Gateway 802. 11 i Ki / IMSI 802. 1 x with EAP/SIM
Authentication Protocol AAA Network MAP : Mobile Application Part MTP : Message Transfer Part SCCP : Signaling Connection Control Part TCAP : Transaction Capabilities Application Part
User Identity Format Network Access Identifier (NAI) : foolfish. lin@comm. ccu SIM-based : [Mobile Country Code][Mobile Network Code][Mobile Subscriber Identification Number]
Authentication in GSM IMSI to E. 214 Ki AAA Network
Authentication and Roaming RAND (nonce, Kc, RAND) MAC A 3/A 8 (nonce, Kc’, RAND) MAC’ Kc’/SRES’
Subscriber Identity Privacy • GSM networks protect the privacy of the subscriber identity with temporary identities (TMSI). • WLAN system introduces a new type of temporary identities called pseudonyms. • In the very first connection with an AS, the client always transmits the clear text IMSI and uses pseudonym as the username portion of the NAI in subsequent connections.
Subscriber Identity Privacy Pseudonyms IMSI (Encrypted pseudonyms)
Accounting and Billing Access Network Auth. Server GTP’ proprietary / FTP CDR : Charging Data Records CGF : Charging Gateway Functionality CG : Charging Gateway BS : Billing System GTP’ : GPRS Tunneling Protocol proprietary
System Implementation • Nokia Operator Wireless LAN solution release 2. 0 • Nokia A 036 AP – Linux OS, ARM 940, Kernel 2. 4. 17, Po. E • AS is based on PC-Server (Compaq) – Windows NT 4. 0, RADIUS, SIM auth. Software • 10 -20 terminal auth. exchanges/sec. – An average connection time of 30 min, 18, 000 -36, 000 simultaneous connections. • For redundancy and load-balancing reasons it’s recommended to have always at least two ASs in a WLAN system.
Conclusions • The solution is generic enough to be used on any access networks that support EAP. • Loose coupling architecture. • Subscriber Identity Privacy issue.
- Slides: 14