Unlike current closed systems such as 2nd and 3rd generations where the corenetwork is controlled by a sole network operator, multiple network operatorswill coexist and manage the core network in Next Generation Networks (NGNs).This open architecture and the collaboration between different networkoperators will support ubiquitous connectivity and thus enhances users'experience. However, this brings to the fore certain security issues which mustbe addressed, the most important of which is the initial Authentication and KeyAgreement (AKA) to identify and authorize mobile nodes on these variousnetworks. This paper looks at how existing research efforts the HOKEY WG,Mobile Ethernet and 3GPP frameworks respond to this new environment and providesecurity mechanisms. The analysis shows that most of the research had realizedthe openness of the core network and tried to deal with it using differentmethods. These methods will be extensively analysed in order to highlight theirstrengths and weaknesses.
展开▼