• Corpus ID: 61007852

PERFORMANCE EVALUATION OF AAA / MOBILE IP AUTHENTICATION

@inproceedings{Hess2002PERFORMANCEEO,
  title={PERFORMANCE EVALUATION OF AAA / MOBILE IP AUTHENTICATION},
  author={Adam Hess and G. Sch},
  year={2002}
}
This article 1 describes a simulation study of the performance of the current IETF approach to authenticating mobile nodes by means of an integrated Authentication, Authorization and Accounting (AAA) infrastructure. The main findings of the study are: 1) the delay experienced by a mobile node in case of a full authentication dialogue involving entities of the mobile node’s home network is largely determined by the end-to-end delay between the foreign and the home network, 2) the workload of AAA… 
On AAA with Extended IDK in Mobile IP Networks
TLDR
An Extended IDentification Key (EIDK) mechanism based on IDK with Authentication Value (AV) that can reduce the number of signaling messages and thus signaling delay for services even in handoffs while maintaining the similar level of security to the previous works is proposed.
IDentification Key Based AAA Mechanism in Mobile IP Networks
TLDR
A new mobile initiated handoff mechanism using an IDentification Key (IDK) that supports authentication and authorization for the MN, and reduces delay and the risk in authentication, and shows that the use of IDK for an MN in AAA model reduces the latency up to 40% while maintaining the similar level of security.
A quantitative study of authentication and QoS in wireless IP networks
  • W. LiangWenye Wang
  • Computer Science
    Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
  • 2005
TLDR
A system model based on a challenge/response authentication is introduced and a concept of security level is proposed to describe the protection of communications according to the nature of security, i.e., information secrecy, data integrity, and resource availability.
Session Key Forwarding Scheme Based on AAA Architecture in Wireless Networks
TLDR
This paper proposes session key forwarding scheme that can reduce an authentication time and an authentication failure rate while maintaining a security level and performance results show that the proposed scheme reduces the authentication latency up to 6.16% and the authentication failure rates up to 23.9% compared to the standard AAA architecture.
Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments
TLDR
This paper creates the possibility of public key based authentication mechanisms being used for future mobile terminal authentication, although current public keybased authentication mechanisms result in lower performance than symmetric key based Authentication.
An Authentication Protocol for Proxy Mobile IPv6
  • Huachun ZhouHongke Zhang
  • Computer Science, Business
    2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks
  • 2008
TLDR
In addition to providing access authentication, the proposed authentication method prevents threats such as replay attack and key exposure and develops analytic models for the authentication latency and cost analysis.
A lightweight authentication protocol with local security association control in mobile networks
  • W. LiangWenye Wang
  • Computer Science
    IEEE MILCOM 2004. Military Communications Conference, 2004.
  • 2004
TLDR
Simulation results show that the proposed approach outperforms DIAMETER for macro-mobility users with high volume of authentication requests.
Authentication of Mobile Node Using AAA in Coexistence of VPN and Mobile IP
TLDR
This paper provides the authentication and key exchange using AAA infrastructure for a user in Internet to access the intranet behind the VPN Gateway while roaming.
A New Handover Authentication Method for WiMAX Architecture
TLDR
This paper analyzes the existing INEA authentication process and proposes a new authentication method and key agreement for handovers process and shows that proposed protocol outperforms the other protocols.
An analytical study on the impact of authentication in wireless local area network
  • W. LiangWenye Wang
  • Computer Science
    Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)
  • 2004
TLDR
A system model is introduced for the analysis of challenge/response authentication in wireless networks and authentication cost, delay, and call dropping probability for different security levels are evaluated.
...
...

References

SHOWING 1-10 OF 33 REFERENCES
Current Approaches to Authentication in Wireless and Mobile Communications Networks
TLDR
The main results of this comparative analysis concerning an authentication infrastructure for wireless Internet access are that the protocols as proposed in current IETF working groups still need further evaluation of their security characteristics, and do exhibit serious deficiencies regarding the location privacy of mobile nodes.
A Security Architecture for the Internet Protocol
TLDR
The design, rationale, and implementation of a security architecture for protecting the secrecy and integrity of Internet traffic at the Internet Protocol (IP) layer, which includes a modular key management protocol, called MKMP, is presented.
Mobile IPv4 Challenge/Response Extensions
TLDR
In this specification, extensions for the Mobile IP Agent Advertisements and the Registration Request that allow a foreign agent to use a challenge/response mechanism to authenticate the mobile node are defined.
IP Encapsulating Security Payload (ESP)
This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide
Mobile IP Authentication, Authorization, and Accounting Requirements
TLDR
This document contains the requirements which would have to be supported by a AAA service to aid in providing Mobile IP services.
Traffic model for third generation cellular mobile telecommunication systems
TLDR
The analytical traffic model presented in this paper incorporates a set of simplifying assumptions regarding the distribution of certain random time intervals and the handover arrival process, focusing on the estimation of the cell border crossing rate and the time it takes a busy mobile user to leave a cell area.
The TLS Protocol Version 1.0
TLDR
This document specifies Version 1.0 of the Transport Layer Security (TLS) protocol, which provides communications privacy over the Internet by allowing client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.
Mobile IP: The Internet Unplugged
TLDR
This book discusses mobile communications, security, and the future of Mobile with a focus on the role of the mobile network in the 21st Century.
Fast Hashing on the Pentium
TLDR
This paper shows that carefully coded implementations of the MD4-family of hash functions are able to exploit the Pentium's superscalar architecture to its maximum effect: the performance with respect to execution on a non-parallel architecture increases by about 60%.
Criteria for Evaluating Roaming Protocols
TLDR
This document describes requirements for the provisioning of "roaming capability" for dialup Internet users with the ability to use multiple Internet service providers (ISPs), while maintaining a formal, customer-vendor relationship with only one.
...
...