TIA-1050 100-2011 cdma2000 Packet Data Services Wireless Local Area Network (WLAN) Interworking C Access to Internet《Cdma2000分组数据服务 无线局域网(WLAN)互通 互联网接入 访问》.pdf

上传人:花仙子 文档编号:1060021 上传时间:2019-03-31 格式:PDF 页数:64 大小:888.14KB
下载 相关 举报
TIA-1050 100-2011 cdma2000 Packet Data Services Wireless Local Area Network (WLAN) Interworking C Access to Internet《Cdma2000分组数据服务 无线局域网(WLAN)互通 互联网接入 访问》.pdf_第1页
第1页 / 共64页
TIA-1050 100-2011 cdma2000 Packet Data Services Wireless Local Area Network (WLAN) Interworking C Access to Internet《Cdma2000分组数据服务 无线局域网(WLAN)互通 互联网接入 访问》.pdf_第2页
第2页 / 共64页
TIA-1050 100-2011 cdma2000 Packet Data Services Wireless Local Area Network (WLAN) Interworking C Access to Internet《Cdma2000分组数据服务 无线局域网(WLAN)互通 互联网接入 访问》.pdf_第3页
第3页 / 共64页
TIA-1050 100-2011 cdma2000 Packet Data Services Wireless Local Area Network (WLAN) Interworking C Access to Internet《Cdma2000分组数据服务 无线局域网(WLAN)互通 互联网接入 访问》.pdf_第4页
第4页 / 共64页
TIA-1050 100-2011 cdma2000 Packet Data Services Wireless Local Area Network (WLAN) Interworking C Access to Internet《Cdma2000分组数据服务 无线局域网(WLAN)互通 互联网接入 访问》.pdf_第5页
第5页 / 共64页
点击查看更多>>
资源描述

1、 TIA-1050.100 October 2011cdma2000Packet Data Services: Wireless Local Area Network (WLAN) Interworking Access to Internet NOTICE TIA Engineering Standards and Publications are designed to serve the public interest through eliminating misunderstandings between manufacturers and purchasers, facilitat

2、ing interchangeability and improvement of products, and assisting the purchaser in selecting and obtaining with minimum delay the proper product for their particular need. The existence of such Standards and Publications shall not in any respect preclude any member or non-member of TIA from manufact

3、uring or selling products not conforming to such Standards and Publications. Neither shall the existence of such Standards and Publications preclude their voluntary use by Non-TIA members, either domestically or internationally. Standards and Publications are adopted by TIA in accordance with the Am

4、erican National Standards Institute (ANSI) patent policy. By such action, TIA does not assume any liability to any patent owner, nor does it assume any obligation whatever to parties adopting the Standard or Publication. This Standard does not purport to address all safety problems associated with i

5、ts use or all applicable regulatory requirements. It is the responsibility of the user of this Standard to establish appropriate safety and health practices and to determine the applicability of regulatory limitations before its use. (From Project No. 3-0174.100, formulated under the cognizance of t

6、he TIA TR-45 Mobile (b) there is no assurance that the Document will be approved by any Committee of TIA or any other body in its present or any other form; (c) the Document may be amended, modified or changed in the standards development or any editing process. The use or practice of contents of th

7、is Document may involve the use of intellectual property rights (“IPR”), including pending or issued patents, or copyrights, owned by one or more parties. TIA makes no search or investigation for IPR. When IPR consisting of patents and published pending patent applications are claimed and called to

8、TIAs attention, a statement from the holder thereof is requested, all in accordance with the Manual. TIA takes no position with reference to, and disclaims any obligation to investigate or inquire into, the scope or validity of any claims of IPR. TIA will neither be a party to discussions of any lic

9、ensing terms or conditions, which are instead left to the parties involved, nor will TIA opine or judge whether proposed licensing terms or conditions are reasonable or non-discriminatory. TIA does not warrant or represent that procedures or practices suggested or provided in the Manual have been co

10、mplied with as respects the Document or its contents. If the Document contains one or more Normative References to a document published by another organization (“other SSO”) engaged in the formulation, development or publication of standards (whether designated as a standard, specification, recommen

11、dation or otherwise), whether such reference consists of mandatory, alternate or optional elements (as defined in the TIA Engineering Manual, 4thedition) then (i) TIA disclaims any duty or obligation to search or investigate the records of any other SSO for IPR or letters of assurance relating to an

12、y such Normative Reference; (ii) TIAs policy of encouragement of voluntary disclosure (see Engineering Manual Section 6.5.1) of Essential Patent(s) and published pending patent applications shall apply; and (iii) Information as to claims of IPR in the records or publications of the other SSO shall n

13、ot constitute identification to TIA of a claim of Essential Patent(s) or published pending patent applications. TIA does not enforce or monitor compliance with the contents of the Document. TIA does not certify, inspect, test or otherwise investigate products, designs or services or any claims of co

14、mpliance with the contents of the Document. ALL WARRANTIES, EXPRESS OR IMPLIED, ARE DISCLAIMED, INCLUDING WITHOUT LIMITATION, ANY AND ALL WARRANTIES CONCERNING THE ACCURACY OF THE CONTENTS, ITS FITNESS OR APPROPRIATENESS FOR A PARTICULAR PURPOSE OR USE, ITS MERCHANTABILITY AND ITS NONINFRINGEMENT OF

15、 ANY THIRD PARTYS INTELLECTUAL PROPERTY RIGHTS. TIA EXPRESSLY DISCLAIMS ANY AND ALL RESPONSIBILITIES FOR THE ACCURACY OF THE CONTENTS AND MAKES NO REPRESENTATIONS OR WARRANTIES REGARDING THE CONTENTS COMPLIANCE WITH ANY APPLICABLE STATUTE, RULE OR REGULATION, OR THE SAFETY OR HEALTH EFFECTS OF THE C

16、ONTENTS OR ANY PRODUCT OR SERVICE REFERRED TO IN THE DOCUMENT OR PRODUCED OR RENDERED TO COMPLY WITH THE CONTENTS. TIA SHALL NOT BE LIABLE FOR ANY AND ALL DAMAGES, DIRECT OR INDIRECT, ARISING FROM OR RELATING TO ANY USE OF THE CONTENTS CONTAINED HEREIN, INCLUDING WITHOUT LIMITATION ANY AND ALL INDIR

17、ECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, LITIGATION, OR THE LIKE), WHETHER BASED UPON BREACH OF CONTRACT, BREACH OF WARRANTY, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR OTHERWISE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAM

18、AGES. THE FOREGOING NEGATION OF DAMAGES IS A FUNDAMENTAL ELEMENT OF THE USE OF THE CONTENTS HEREOF, AND THESE CONTENTS WOULD NOT BE PUBLISHED BY TIA WITHOUT SUCH LIMITATIONS. Revision History: Revision Date Comments X.S0028-100-0 v1.0 March 2007 Initial publication 1 2 3 4 5 6 7 8 9 10 11 12 13 14 1

19、5 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 X.S0028-100-0 v1.0 3GPP2 ii Contents CONTENTS Contents ii List of Tablesiii Foreword iv 1 Introduction.1 1.1 Scope 1 2 References.2 2.1 Normative References 2 2.2 Informative References.3 3 Definitions, Symbols and Abbreviations 5 3

20、.1 Definitions 5 3.2 Symbols and Abbreviations6 4 Interworking Architecture.7 4.1 Reference Model.8 4.2 Network Entities .8 4.3 Interfaces 9 5 Service Description.10 6 Network Advertisement and Selection11 6.1 Wireless LAN Requirements11 6.2 MS Requirements .11 7 Authentication Methods12 7.1 802.1x

21、WLAN 12 7.1.1 WKEY Derivation12 7.1.2 EAP-TLS with Pre-Shared Key31 7.1.3 EAP-AKA 35 7.2 Non-802.1x WLAN 40 7.2.1 WLAN Requirements.40 7.2.2 MS Requirements.40 7.2.3 Security Considerations40 8 Accounting41 9 RADIUS Attributes.42 A Annex A (normative): TIA-41-E Enhancements to Support WLAN Interwork

22、ing .44 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 X.S0028-100-0 v1.0 3GPP2 iii List of Tables LIST OF FIGURES Figure 1 WLAN interworking architecture for scenario 28 Figure 2 HLR/AC-Based WKEY Generation.14 Figure 3 MN-AAA Key based WKEY ge

23、neration. 22 Figure 4 WLAN access authentication using EAP-TLS with pre-shared keys.33 Figure 5. Successful Authentication with EAP-AKA.36 Figure 6 Successful Authentication with EAP-AKA with WKEY bootstrapped in the MS.38 LIST OF TABLES Table 1 Supported RADIUS Authentication and Authorization Attr

24、ibutes42 Table 2 Supported RADIUS Accounting Attributes. .43 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 X.S0028-100-0 v1.0 3GPP2 iv Foreword FOREWORD (This foreword is not part of this Standard.) This document is a new specification. This do

25、cument contains one normative Annex. This document is part of a multi-part document consisting of multiple parts that together describes cdma2000 Wireless Local Area Network Interworking. This document is subject to change following formal approval. Should this document be modified, it will be re-re

26、leased with a change of release date and an identifying change in version number as follows: X.S0028-100-Z vy.z where: Z denotes revision 0, A, B, : 0 is the initial release (0th revision), A is the first revision, B the second revision, etc v the letter “v” with no trailing space y is the “point re

27、lease” number 0 is used when the document is first created, 1 number is incremented whenever the document is approved for publication (e.g., 1 is the first approval by the plenary for publication) z is an internal edit level 0 internal edit level z, always reset to 0 when the document is approved fo

28、r publication, 1 internal edit level is incremented by the entity (e.g., working group) that is developing the document. This document uses the following conventions: “Shall” and “shall not” identify requirements to be followed strictly to conform to this document and from which no deviation is perm

29、itted. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 X.S0028-100-0 v1.0 3GPP2 v Foreword “Should” and “should not” indicate that one of several possibilities is recommended as particularly suitable, without mentioning or excluding others, that

30、a certain course of action is preferred but not necessarily required, or that (in the negative form) a certain possibility or course of action is discouraged but not prohibited. “May” and “need not” indicate a course of action permissible within the limits of the document. “Can” and “cannot” are use

31、d for statements of possibility and capability, whether material, physical or causal. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 X.S0028-100-0 v1.0 3GPP2 1 Introduction 1 Introduction This document defines the stage-2 and stage-3 requirements f

32、or supporting cdma20001Wireless Local Area Network Interworking System. 1.1 Scope This document is part of a multi-part document consisting of multiple parts that together describes cdma2000 Wireless Local Area Network Interworking. The scope of this document covers support for common billing, custo

33、mer care and cdma2000 based access control and accounting. WLAN interworking service provides Internet access to subscribers of cdma2000 systems via a WLAN network operated by either cdma2000 operators or Wireless LAN network operators who have a service agreement with cdma2000 operators. 1cdma2000

34、is the trademark for the technical nomenclature for certain specifications and standards of the Organizational Partners (OPs) of 3GPP2. Geographically (and as of the date of publication), cdma2000 is a registered trademark of the Telecommunications Industry Association (TIA-USA) in the United States

35、 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 X.S0028-100-0 v1.0 3GPP2 2 References 2 References References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. For a specific reference, s

36、ubsequent revisions do not apply. For non-specific reference, the latest version applies. In the case of a reference to a 3GPP2 document, a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. 2.1 Normative References The follow

37、ing documents contain provisions which, through reference in this text, constitute provisions of this Specification, with exceptions noted herein. At the time of publication, the editions indicated were valid. All documents are subject to revision, and parties to agreements based on this Specificati

38、on are encouraged to investigate the possibility of applying the most recent editions of the documents indicated below. 1 3GPP2: S.S0055-A v1.0, Enhanced Cryptographic Algorithms, September 2003. 2 3GPP2: S.R0087-0 v1.0, 3GPP2 WLAN Interworking Stage 1 Requirements, August 2004. 3 3GPP2: C.S0007-0 v

39、2.0, Direct Spread Specification for Spread Spectrum Systems on ANSI-41 (DS-41) (Upper Layers Air Interface), July 2000. 4 3GPP2: C.S0023, Removable User Identity Module for Spread Spectrum Systems. 5 3GPP2: C.S0001-D v1.0, Introduction to cdma2000 Spread Spectrum Systems - Revision D, March 2004. 6

40、 3GPP2: C.S0016-C v1.0, Over-the-Air Service Provisioning of Mobile Stations in Spread Spectrum Standards, November 2004. 7 3GPP2: C.S0004-C v2.0, Signaling Link Access Control (LAC) Standard for cdma2000 Spread Spectrum Systems, August 2004. 8 3GPP2: X.S0004-550-E v1.0, MAP Parameters Signaling Pro

41、tocols, April 2004. 9 3GPP2: C.S0005-D v1.0, Upper Layer (Layer 3) Signaling Standard for cdma2000 Spread Spectrum Systems - Release D, March 2004. 10 3GPP2: X.S0004-640-E v1.0, Wireless Radio telecommunications Intersystem Operations: Intersystem Procedures 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

42、 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 X.S0028-100-0 v1.0 3GPP2 3 References 11 IEEE: “Amendment 6: Medium Access Control (MAC) Security Enhancements”, IEEE Std 802.11i-2004. Published 23 July 2004. 12 IEEE: “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specif

43、ications”, IEEE Std. 802.11-1999. 13 IEEE: “Local and Metropolitan Area Networks: Port-Based Network Access Control”, IEEE Standard 802.1X, September 2001. 14 IETF: D. Eastlaek, S. Croker, J. Schiller, “Randomness Recommendations for Security”, RFC 1750, December 1994. 15 IETF: T. Dierks, et al, “Th

44、e TLS Protocol Version 1.0”, RFC 2246, January 1999. 16 IETF: G. Zorn, “Microsoft Vendor-specific RADIUS Attributes”, RFC 2548, March 1999. 17 IETF: B. Aboba, D. Simon, “PPP EAP-TLS Authentication protocol”, RFC 2716, October 1999. 18 IETF: Rigney, et al, “Remote Authentication Dial In User Service

45、(RADIUS)”, RFC 2865, June 2000. 19 IETF: Rigney, “RADIUS Accounting”, RFC 2866, June 2000. 20 IETF: B. Aboba, P. Calhoun,“RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP)”, RFC 3579, September 2003. 21 IETF: P. Congdon, et al, “IEEE 802.1X Remo

46、te Authentication Dial In User Service (RADIUS) Usage Guidelines”, RFC 3580, September 2003. 22 IETF: B. Aboba, et al, “Extensible Authentication Protocol (EAP)”, RFC 3748, June 2004. 23 IETF: J. Arko., Extensible Authentication Protocol Method for UMTS Authentication and Key Agreement (EAP-AKA), RF

47、C 4187, January 2006. 24 IETF: “Pre-Shared Key Cipher suites for TLS”, RFC 4279, Dec. 2005. 25 WFA: Wi-Fi Alliance, Best current practices for Wireless ISP roaming, v1.0, Feb. 2003. 26 WFA: Wi-Fi Protected Access (WPA) Specification, Version 3.1. Wi-Fi Alliance. 2.2 Informative References This secti

48、on provides references to other documents that may be useful for the reader of this document. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 X.S0028-100-0 v1.0 3GPP2 4 References 27 3GPP2: X.S0028-200-0, Access to Operator Service and Mobility for

49、WLAN Interworking, TBD. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 X.S0028-100-0 v1.0 3GPP2 5 Definitions, Symbols and Abbreviations 3 Definitions, Symbols and Abbreviations This section contains definitions, symbols and abbreviations that are used throughout the document. 3.1 Definitions EAP server As defined by 22, the entity that terminates the EAP authentication method with the peer. In this document the EAP server is the

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1