(3.235.191.87) 您好!臺灣時間:2021/05/13 14:57
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:劉威廷
研究生(外文):Wei-Ting Liu
論文名稱:UMTS第三代行動電話與無線網路雙網整合之行動管理研究
論文名稱(外文):A Study of Mobility Management for 3G/UMTS-WLAN Interworking
指導教授:楊朝成楊朝成引用關係
指導教授(外文):Chou-Chen Yang
學位類別:碩士
校院名稱:朝陽科技大學
系所名稱:網路與通訊研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2005
畢業學年度:93
語文別:英文
論文頁數:79
中文關鍵詞:異質性網路3G-WLAN雙網整合第三代行動通訊行動管理
外文關鍵詞:3G-WLAN interworking3G networkMobility Managementheterogeneous network
相關次數:
  • 被引用被引用:2
  • 點閱點閱:318
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:22
  • 收藏至我的研究室書目清單書目收藏:0
行動通訊技術的發展在近年來受到極大的關注,第三代行動通訊系統(Third generation, 3G)提供了廣大的覆蓋率、高速移動能力、完整的安全記帳機制以及近乎全球的漫遊能力。另一方面來說,無線區域網路提供了一個小範圍、低移動能力、高資料傳輸率的網際網路存取方案,由於這兩種網路的特性互補,相關研究指出整合這兩種網路技術將可以結合兩者的優點。3GPP制訂了3G/UMTS-WLAN整合的規格書,並提供了一個有彈性的雙網整合方案,但是目前的規格發展仍在進行中,相關的需求諸如服務繼續、無縫換手、高效率行動管理(Mobility Management)等問題仍有改善空間。除此之外,IP(Internet Protocol)協定已經被視為次世代異質性網路(heterogeneous network)整合的關鍵技術,原先IP方面的行動管理機制將會在未來All-IP-based核心網路當中扮演重要的角色。
基於前述的原因與背景,本論文的主要內容為研究3G/UMTS-WLAN雙網整合架構,並以3G/UMTS -WLAN雙網整合架構為範本來研究與設計次世代All-IP-based異質性網路的行動管理架構。本論文將會針對現有的行動管理機制以及相關的議題諸如註冊程序、安全、網路架構設計等加以討論,最後我們將提出一個基於快速區域性註冊(localized fast re-authentication)及預先註冊(pre-register)觀念的行動管理架構。我們的方法將可以提高行動管理的效率以及減少換手的延遲時間,提供一個有效率的3G/UMTS-WLAN雙網整合行動管理架構來達到未來all-IP異質性網路的需求。
The mobile communication technology becomes more and more popular in the recently years. The 3G (Third generation) mobile communication system has large coverage, high speed mobility, completed subscriber management (billing system) and nearly universal roaming. On the other hand, the wireless local area network (WLAN) provides a solution for the internet access which has small coverage, low speed mobility and high data transmission rates. Some researches point out that integrates those two wireless technologies will get advantage since their characteristics are complementary under some conditions. 3GPP proposed some specifications of 3G/UMTS-WLAN interworking which give an approach for a flexible, scalable, and general way of the 3G/UMTS-WLAN interworking. However, the research of 3G/UMTS-WLAN interworking specifications still in process of more requirement such as service continuity, seamless handoff, efficient mobility management (MM) and so on. Meanwhile, the original MM method in IP (Internet Protocol) protocol will become more important since the IP-based core network is required in the next-generation (NG) heterogeneous wireless network system.
As the above reasons, this study focus on the 3G/UMTS-WLAN interworking architecture and use it as the start of the NG all-IP-based heterogeneous networks. In this study, we will review the Mobile IP protocol, present MM scheme and the other important issues such as registration procedure, security, network architecture design…etc. Furthermore, we will propose a mobility management architecture including localized fast re-authentication and handoff procedure for the 3G/UMTS-WLAN interworking. Our proposed architecture uses pre-register conception joins forces with localized fast re-authentication. Therefore, our proposed architecture improves the efficiency of 3G/UMTS-WLAN interworking mobility management and solves some problems under particular conditions.
TABLE OF CONTENTS

Chapter 1 Introduction 1
1.1 Research Background and Motivation 1
1.2 Research Approach and Scope 3
1.3 Thesis Organization 4
Chapter 2 Related Theories and Schemes 5
2.1 Symmetric cryptosystem 5
2.2 Keyed-Hash Message Authentication Code (HMAC) 6
2.3 Hash Chaining 6
Chapter 3 Literatures Review 8
3.1 Mobile IP 8
3.2 Authentication, Authorization and Accounting 14
3.3 Wireless Local Area Network (WLAN) 17
3.4 3G/UMTS Network Architecture 19
3.5 3G-WLAN Interworking Architecture 21
3.6 Mobility Management 27
Chapter 4 Our Proposed Mobility Management Architecture for the 3G/UMTS-WLAN Interworking 31
4.1 Proposed Localized Fast Re-authentication Protocol 31
4.1.1 Notation 32
4.1.2 Full Authentication Protocol 32
4.1.3 Fast Re-authentication Protocol 36
4.1.4 Security analysis 37
4.2 Proposed Mobility Management Architecture Based on Mobile IPv6 39
4.3 3G/UMTS-WLAN Interworking Handoff Procedures 40
4.3.1 Inter-handoff from 3G/UMTS to WLAN 41
4.3.2 Intra-handoff Between Two WLANs 47
4.3.3 Inter-handoff from WLAN to 3G/UMTS 48
4.4 Performance Analysis 49
4.4.1 Handoff and re-Authentication Cost Analysis 51
4.4.2 Handoff Delay Analysis 55
4.4.3 Numerical Results 57
Chapter 5 Conclusions and Future Work 68
5.1 Conclusions 68
5.2 Further Research Topics and Directions 69
Bibliography 70
Appendix A 3GPP WLAN Interworking Authentication Scheme 76
Vita 78

LIST OF TABLES

Table 1 : 3GPP-WLAN interworking scenarios and their capabilities 25
Table 2 : The mobility classification based on Coverage and characteristic 28
Table 3 : The mobility classification based on three types of Mobility 29
Table 4 : The numerical values of analysis network parameter 58
Table 5 : The comparisons of 3G/UMTS-WLAN interworking architecture and our proposed scheme based on various conditions 67
Table 6 : A comparison of 3G/UMTS-WLAN interworking architecture and our proposed scheme based on various network parameters 67


LIST OF FIGURES

Figure 1 : Mobile IPv4 Architecture 11
Figure 2 : Mobile IPv6 Route optimization 14
Figure 3 : UMTS network architectures 20
Figure 4 : 3G-WLAN interworking network architecture – 3GPP PS based services provided via the 3GPP Home Network 22
Figure 5 : 3G-WLAN interworking reference model and network architecture 27
Figure 6 : Full Authentication procedures 35
Figure 7 : Fast re-authentication protocol 37
Figure 8 : The mobility management of 3G-WLAN interworking based on Mobile IPv6 40
Figure 9 : Inter-handoff: 3G/UMTS to WLAN 46
Figure 10 : Intra-handoff between two WLANs 48
Figure 11 : A simple mode for performance evaluation 51
Figure 12 : Handoff and re-authentication cost vs. delay between MN and CN/PSS 60
Figure 13 : Handoff and re-authentication cost vs. delay between MN and its home 3G network 61
Figure 14 : Handoff and re-authentication cost vs. wireless link delay 62
Figure 15 : Handoff delay vs. delay between MN and CN/PSS 63
Figure 16 : Handoff delay vs. delay between MN and its home 3G nework 64
Figure 17 : Handoff delay vs. wireless link delay 65
[1]3GPP, Tech. Spec. Group, Core Network, “3GPP system to Wireless Local Area Network (WLAN) interworking; User Equipment (UE) to network protocols; Stage 3 (release 6),” Tech. Spec. 3GPP TS 24.234 V. 6.0.0 (2004-09), 2004.
[2]3GPP, Tech. Spec. Group, Services and System Aspects, “3G Security, Security Architecture (release 6),” Tech. Spec. 3GPP TS 33.102 V. 6.2.0 (2004-09), 2004.
[3]3GPP, Tech. Spec. Group, Core Network, “Interworking between the Public Land Mobile Network (PLMN) supporting packet based services with Wireless Local Area Network (WLAN) Access and Packet Data Networks (PDN) (release 6),” Tech. Spec. 3GPP TS 29.161 V. 6.0.0 (2004-09), 2004.
[4]3GPP, Tech. Spec. Group, Core Network, “3GPP system to Wireless Local Area Network (WLAN) interworking; Stage 3 (release 6),” Tech. Spec. 3GPP TS 29.234 V. 6.0.0 (2004-09), 2004.
[5]3GPP, Tech. Spec. Group, Svcs. and Sys. Aspects, “General Packet Radio Service (GPRS); Service Description,” Tech. Spec. 3G TS 23.060 V. 6.0.0 (2004-09), 2004.
[6]3GPP, Tech. Spec. Group, Service and System Aspects, “Requirements on 3GPP system to Wireless Local Area Network (WLAN) interworking (release 6),” Tech. Spec. 3GPP TS 22.234 V. 6.1.0 (2004-06), 2004.
[7]3GPP, Tech. Spec. Group, Service and System Aspects, “Feasibility study on 3GPP system to Wireless Local Area Network (WLAN) interworking (release 6),” Tech. Spec. 3GPP TS 22.934 V. 6.2.0 (2003-09), 2003.
[8]3GPP, Tech. Spec. Group, Service and System Aspects, “3GPP system to Wireless Local Area Network (WLAN) interworking; System description (release 6),” Tech. Spec. 3GPP TS 23.234 V. 6.1.0 (2004-06), 2004.
[9]3GPP, Tech. Spec. Group, Service and System Aspects, “3GPP system to Wireless Local Area Network (WLAN) interworking; Functional and architectural definition (release 6),” Tech. Spec. 3GPP TS 23.934 V. 1.0.0 (2002-08), 2002.
[10]3GPP, Tech. Spec. Group, Service and System Aspects, “Telecommunication management; Charging Management; Wireless Local Area Network (WLAN) charging; (release 6),” Tech. Spec. 3GPP TS 32.252 V. 0.2.1 (2004-04), 2004.
[11]3GPP, Tech. Spec. Group, Service and System Aspects, “3G Security; Wireless Local Area Network (WLAN) interworking security (release 6),” Tech. Spec. 3GPP TS 33.234 V. 6.0.0 (2004-03), 2004.
[12]3GPP, Tech. Spec. Group, Core Network, “GPRS Tunneling Protocol (GTP) across the Gn and Gp Interface,” Tech. Spec. 3G TS 29.060 V. 6.6.0 (2004-09), 2004.
[13]A.K. Salkintzis, “Interworking Techniques and Architectures for WLAN/3G Integration Toward 4G Mobile Data Networks,” IEEE Wireless Communications, 2004, Vol. 11, No. 3, pp. 50–61.
[14]A.K. Salkintzis, “WLAN/3G Interworking Architectures for Next Generation Hybrid Data Networks," IEEE International Conference on Communications, 2004, pp. 3984–3988.
[15]A.K. Salkintzis, C. Fors and R. Pazhyannur, “WLAN-GPRS integration for next-generation mobile data networks,” IEEE Wireless Communications, 2002, Vol. 9, No. 5, pp. 112–124.
[16]M. Cappiello, A. Floris, L. Veltri, ”Mobility amongst heterogeneous networks with AAA support”, IEEE International Conference on Communications, 2002, pp. 2064–2069.
[17]C. Perkins, “IP Mobility Support,” RFC 2002, October 1996.
[18]C. de Laat, G. Gross, L. Gommans, and J. Vollbrecht, D. Spence, “Generic AAA Architecture,” RFC 2903, IETF, Aug 2000.
[19]C. Politis, K.A. Chew, N. Akhtar, M. Georgiades, R. Tafazolli and T. Dagiuklas, “Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks,” IEEE Wireless Communications, 2004, Vol. 11, No. 4, pp.76–88.
[20]D.I. Axiotis, T. Al-Gizawi, K. Peppas, E.N. Protonotarios, F.I. Lazarakis, C. Papadias and P.I. Philippopoulos, “Services in interworking 3G and WLAN environments,” IEEE Wireless Communications, 2004, Vol. 11, No. 5, pp. 14-20.
[21]Geir M. Koien and Thomas Haslestad, “Security Aspects of 3G–WLAN Interworking,” IEEE Communications Magazine, 2003, Vol. 41, No. 5, pp. 82–88.
[22]G. Kambourakis, A. Rouskas, G. Kormentzas and S. Gritzalis, “Advanced SSL/TLS-based authentication for secure WLAN-3G interworking,” IEEE Proceedings-Communications, 2004, pp. 501–506.
[23]H. Holma and A. Toskala, Eds., WCDMA for UMTS, Wiley, 2000.
[24]Hyun-Ho Choi; Osok Song; Dong-Ho Cho, “A seamless handoff scheme for UMTS-WLAN interworking”, IEEE Global Telecommunications Conference, 2004, pp. 1559–1564
[25]IEEE Std 802.11i/D7.0, October 2003: “Draft Supplement to Standard for Telecommunications and Information Exchange Between Systems – LAN/MAN Specific Requirements – Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Specification for Enhanced Security”
[26]IEEE Std, 802.1X-2001, “IEEE Standard for Local an Metropolitan Area Networks—Port-Based Network Access Control,” July 2001.
[27]I.F. Akyildiz, Jiang Xie and S. Mohanty, “A survey of mobility management in next-generation all-IP-based wireless systems,” IEEE Wireless Communications, 2004, Vol. 11, No. 4, pp. 16–28.
[28]Jee-young Song; Sung-won Lee; Dong-ho Cho, “Hybrid coupling scheme for UMTS and wireless LAN interworking”, Vehicular Technology Conference, 2003, pp. 2247–2251.
[29]Juha Korhonen, Introduction to 3G mobile communications, Artech House, 2003.
[30]K.D. Wong, A. Dutta, J. Burns, R. Jain, K. Young and H. Schulzrinne, “A multilayered mobility management scheme for auto-configured wireless IP networks,” IEEE Wireless Communications, 2003, Vol. 10, No. 5, pp. 62–69.
[31]K. Ahmavaara, H. Haverinen and R. Pichna, “Interworking architecture between 3GPP and WLAN systems,” IEEE Communications Magazine, 2003, Vol. 41, No. 11, pp. 74–81.
[32]L. Blunk, and J. Vollbrecht, “PPP Extensible Authentication Protocol (EAP),” RFC 2284, IETF, Mar 1998.
[33]Lein Harn and Wen-Jung Hsin, “On the Security of Wireless Network Access with Enhancements,” Proceedings of the 2003 ACM workshop on Wireless security, 2003, pp. 88–95.
[34]Li Ma, Fei Yu, V.C.M. Leung and T. Randhawa, “A new method to support UMTS/WLAN vertical handover using SCTP,” IEEE Wireless Communications, 2004, Vol. 11, No. 4, pp. 44–51.
[35]L. Salgarelli, M. Buddhikot, J. Garay, S. Patel and S. Miller, "Efficient authentication and key distribution in wireless IP networks," IEEE Wireless Communications, 2003, Vol. 10, No. 6, pp. 52–61.
[36]M.M. Buddhikot, G. Chandranmenon, Seungjae Han, Yui-Wah Lee, S. Miller and L. Salgarelli, “Design and implementation of a WLAN/cdma2000 interworking architecture,” IEEE Communications Magazine, 2003, Vol. 41, No. 11, pp. 90–100.
[37]Ming-Chia Jiang, Jyh-Cheng Chen and Yi-Wen Liu, “WLAN-Centric Authentication in Integrated GPRS-WLAN Networks,” IEEE Vehicular Technology Conference, 2003, pp. 2242–2246.
[38]M. Lott, M. Siebert, S. Bonjour, D. von Hugo and M. Weckerle, “Interworking of WLAN and 3G systems,” IEEE Proceedings- Communications, 2004, pp. 507–513.
[39]Pang Ai-Chun, Chen Jyh-Cheng, Chen Yuan-Kai and P. Agrawal, “Mobility and session management: UMTS vs. cdma2000,” IEEE Wireless Communications, 2004, Vol. 11, No. 4, pp. 30–43.
[40]B. Aboba, M. Beadles, “The Network Access Identifier,” RFC 2486, IETF, January 1999.
[41]S.M. Faccin, P. Lalwaney and B. Patil, “IP multimedia services: analysis of mobile IP and SIP interactions in 3G networks,” IEEE Communications Magazine, 2004, Vol. 42, No. 1, pp. 113–120.
[42]“The Keyed-Hash Message Authentication Code (HMAC)”. Federal Information Processing Standards Publication. Draft. 2001.
[43]T.T. Kwon, M. Gerla and S. Das, “Mobility management for VoIP service: Mobile IP vs. SIP,” IEEE Wireless Communications, 2002, Vol. 9, No. 5, pp. 66–75.
[44]Yuh-Min Tseng, Chou-Chen Yang and Jiann-Haur Su, “An Efficient Authentication Protocol for Integrating WLAN and Cellular Networks,” Advanced Communication Technology, The 6th International Conference on, 2004, pp. 416–420.
[45]Krawczyk, H., Bellare, M., and Canetti, R., “Keyed-Hashing for Message Authentication,” Internet Engineering Task Force, Request for Comments RFC 2104, IETF, February 1997.
[46]Madson, C., and Glenn, R., “The use of HMAC-MD5-96 within ESP and AH,” RFC 2403, IETF, November 1998.
[47]Madson, C., and Glenn, R. “The use of HMAC-SHA-1-96 within ESP and AH,” RFC 2404, IETF, November 1998.
[48]Anderson, R., Manifavas, C., and Southerland, C., “NetCard-A Practical Electronic Cash System,” International Workshop on security Protocols, 1996, pp. 49–57.
[49]Gennaro, R., and Rohatgi, P. “How to Sign Digital Streams”. Advances in Cryptography-Crypto’97. pp. 180–197.
[50]Harn. L., and Lin, H. “A Non-repudiation Metering Scheme,” IEEE Communication Letters. Vol. 5, No. 12, December 2001.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔