A quantitative study of authentication and QoS in wireless IP networks

作者: Wei Liang , Wenye Wang

DOI: 10.1109/INFCOM.2005.1498383

关键词:

摘要: With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of relationship between security quality service (QoS). In authentication can provide by preventing unauthorized usage negotiating credentials data transmission. Nevertheless, induces heavy overhead transmission, further deteriorating overall system performance. Thus, we analyze impact on QoS quantitatively this paper. First, introduce a model based challenge/response authentication, which widely used many mobile environments. Then, concept level proposed describe protection according nature security, i.e., information secrecy, integrity, resource availability. By taking traffic mobility patterns into account, our approach establishes direct quantitative connection through authentication. Finally, numerical results are provided demonstrate levels, performance terms delay call dropping probability.

参考文章(22)
Wei Liang, Wenye Wang, A cost-aware control scheme for efficient authentication in wireless networks personal, indoor and mobile radio communications. ,vol. 3, pp. 1548- 1552 ,(2004) , 10.1109/PIMRC.2004.1368259
Shiuh-Pyng Shieh, Yu-Lun Huang, Fu Shen Ho, An efficient authentication protocol for mobile networks Journal of Information Science and Engineering. ,vol. 15, pp. 505- 520 ,(1999) , 10.6688/JISE.1999.15.4.2
S. Glass, C. Perkins, S. Jacobs, T. Hiller, Mobile IP Authentication, Authorization, and Accounting Requirements Mobile IP Authentication, Authorization, and Accounting Requirements. ,vol. 2977, pp. 1- 27 ,(2000)
L. Dell'Uomo, E. Scarrone, The mobility management and authentication/authorization mechanisms in mobile networks beyond 3G personal indoor and mobile radio communications. ,vol. 1, ,(2001) , 10.1109/PIMRC.2001.965459
Vipul Gupta, Sumit Gupta, Sheueling Chang, Douglas Stebila, Performance analysis of elliptic curve cryptography for SSL Proceedings of the ACM workshop on Wireless security - WiSE '02. pp. 87- 94 ,(2002) , 10.1145/570681.570691
C. Perkins, P. Calhoun, Mobile IPv4 Challenge/Response Extensions RFC. ,vol. 3012, pp. 1- 17 ,(2000)
Yang Xiao, Jon Rosdahl, Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols Mobile Computing and Communications Review. ,vol. 7, pp. 6- 19 ,(2003) , 10.1145/950391.950396
S.K. Das, E. Lee, K. Basu, S.K. Sen, Performance optimization of VoIP calls over wireless links using H.323 protocol IEEE Transactions on Computers. ,vol. 52, pp. 742- 752 ,(2003) , 10.1109/TC.2003.1204830
Wenye Wang, Ian F. Akyildiz, Intersystem location update and paging schemes for multitier wireless networks acm/ieee international conference on mobile computing and networking. pp. 99- 109 ,(2000) , 10.1145/345910.345928