A Quantitative Study of Authentication and QoS in Wireless IP

advertisement
A Quantitative Study of Authentication and QoS
in Wireless IP Networks
Wenye Wang
Wei Liang
Department of Electrical and Computer Engineering
North Carolina State University, Raleigh, NC 27695
Abstract- With the increasing demand fur secure and
high-quality communications in public access wireless
IP networks, it is very important to have a n in-depth
understanding of the relationship between the security and
quality of service (QoS). In wireless networks, authentication can provide secure communications by preventing
unauthorized usage and negotiating the credentials for
data transmission. Nevertheless, it induces heavy overhead
to data transmission, further deteriorating overall system
performance. Thus, we analyze the impact of authentication an the security and QoS quantitatively in this
paper. First, we introduce a system model based on a
challeng4response authentication, which is widely used in
many mobile environments. Then, a concept of security
level is proposed to describe the protection of communications according to the nature UP security, i.e., information
secrecy, data integrity, and resource availability. By taking
traffic and mobility patterns into account, our approach
establishes a direst and quantitative connection between
the security and QoS through the authentication. Finally,
numerical results are provided to demonstrate the impact
of security levels, mobikity and traffic patterns on overall
system performance in terms of authentication delay and
call dropping probability.
Key Words: Wireless IP networks, challenge/response authentication,secwit)! associafion.
I . INTRODUCTION
The tremendous advance of wireless communication technoloeies has facilitated the ubiquitous Internet service,
whereas inducing more challenges to security due to open
medium [l]. In order to provide security services in wireless
IP networks, authentication is used as an initial process to
authorize a mobile user (MU) for communications through
secret credentials [2]. In an authentication process, an M U
is required to submit secret materids such as certificates
and challenge/response values for verification and encryptioddecryption with session keys and algorithms [31-[61. By
rejecting unsuccessfully authenticated users, authentication
can protect the network resources. The information secrecy
This work was supported in part by the National Science Foundation
tNSF) under award ANI-0322893 and in party by the Center for Advanced
Computing and Communication (CACC) 03-06 and 04-08.
0-7803-8968-9/05/$20.00 (C)z005 IEEE
and data integrily can also be guaranteed by using the negotiated credentials €or encryption and message authentication.
Meanwhile, authentication also affects the quality of service (QoS) greatly. When public-key based authentication
mechanism is applied, the computation complexity of encryption/decryption consumes more time and power [7]. For secretkey based challengehesponse authentication, the credentials of
the MU are encrypted and transmitted for remote verification
hop-by-hop among authentication servers [SI-[ IO]. The transmission and encryptionldecryption of credentials affect many
QoS parameters such as delay, call dropping probability, and
throughput. Therefore. in some scenarios, a uadeoff between
security service and system performance should be considered
because users may have different preferences with respect to
security and performance.
Moreover, authentication requests are closely related to
mobility and traffic patterns of MUS because these requests
are generated when an MU either initiates a call, or crosses a
boundary of subnets. Therefore, the impact of authentication
on QoS parameters is far more sophisticated when mobility
and traffic patterns are taken into account.
Since the authentication affects both of security and QoS,
many authentication schemes are proposed, focusing on the
security and efficiency [ 2 ] , [5], [8]-[15]. However. none of
them provide quantitative analysis of security and system
performance, simultaneously, and nor do they show the connection between security and system performance. Furthermore, mobility and traffic patterns are not considered in the
evaluation of authentication, which are important features in
wireless networks. Therefore, new authentication solutions
may not be adaptive to mobile environments with the concerns
of security. performance, and mobility patterns.
In this paper, we investigate the performance of authentication in wireless IP networks. First, a system model is proposed
to analyze the challengelresponse based authentication, which
is highly consistent with various wireless IP networks such
as Mobile IP and wireless local area network (WAN). This
consistency guarantees that our analytical results are applicable
in r e d mobile environments. Security levels are classified with
the nature of security, i.e., information secrecy, data integrity,
and resource availability, and are introduced to indicate the
protection of communications. Moreover, we analyze authentication delay and call dropping probability at different security
levels in combination with mobilify and truflc parterns. Thus,
our work builds a solid ground far understanding the impacl
1478
of authentication on security and QoS with the concern of
adaptation to various mobiIe environments.
The rest of our paper is organized as follows. In Section 11.
we discuss the effect of authentication on security and QoS
with respect to challengelresponse authentication. In Section
111, we describe a system model and define meuics used for
performance evaluation in the paper. We analyze these mewics
at different security levels with the consideration of mobility
and traffic patterns in Section IV. Then, we provide numerical
results on delay and call dropping probability in Section V.
Finally, we draw a conclusion in Section VI.
11. EFFECTOF AUTHENTICATION ON SECURITY AND Q O S
In this section, we introduce challenge/response authentication, and describe the effects of authentication on security and
QaS with challengelresponse authentication,
A. Oven&w of Challenge/Response Authentication
shared SA with the LAS and replies the response value to the
LAS. After decrypting the replied value and comparing il with
original challenge value, the LAS can authenticate the MU
when the decrypted value matches original challenge value.
Session authentication: When an MU starts a communication
session in a subnet of a foreign network, a session authentication is initiated. At this time, session SA does not exist
between the MU and the AP. Thus, i t is necessary to contact
the HAS of the MU for authentication. As shown in Fig. 1.B,
when an LAS receives the authentication request, it sends a
challenge value to the MU. The MU encrypts the challenge
value with the SA shared with the HAS, and replies the
response value to the LAS, which relays the challenge and
response values to the HAS of the MU for verification due to
lack of SA to decrypt the response value. After authentication
at the HAS, the secret credentials such as keys to protect the
communication may be generated and sent to the LAS.
The authentication in wireless networks is a process to Inter-domain handoff authentication: When an MU is crossidentify Mus and to negotiate credentials for communications. ing the boundaries of different foreign network domains with
In a challenge/response-based authentication, a user is iden- an on-going service, an inter-domain handoff authentication
tified with a shared security association (SA), which is a occurs. Without an existed SA between the MU and the LAS,
trust relationship with many parameters such as keys and the signaling diagram shown in Fig. 1.C is similar with that in
algorithms for secure services [ 161, between an authentication the case of session authentication, except that the MU needs
server. During the process, the server sends a challenge value, registration to its HA via the HAS because we assume that
a random number, to the user for encryption, and verifies the MU needs registration when it is crossing the boundaries
the returned value, called response vuhe, with decryption. of different network domains.
In a foreign network, a visiting MLJ sends an authentication
request to an access point (AP). The AP relays the request to B. Effecfof Authentication on Security
a local authentication server (LAS), which only takes charge
Security services are to provide information secrecy, data inof authentication for visiting M u s from foreign networks. If tegrity, and resource availability for users. Information secrecy
the LAS has no information to verify the MU, it contacts means to prevent the improper disclosure of information in the
the home authentication server (HAS) of the MU through communication, while data integrity is to prevent improper
an authentication architecture. An HAS is an authentication modification of data and resource availability is considered to
server to identify the MUS who subscribe the service in its preventing improper denial of services [16].
network. And, an authentication architecture is composed of
In order to provide security services in wireless networks,
many authentication servers that share SAS with the LAS and challenge/response-based authentication adopts several techHAS. If the request is an inter-domain authentication request, niques. First, it requires the MU to share an SA with its HAS.
the HAS sends a registration request to the MU’s home agent The SA is unique and secret to other users. Therefore, the iden(HA): which maintains the current location of the MU, to tification of the MU is unique, which can prevent unauthorized
update the MU’s location.
Mus from accessing the network resource. Second, session
7Arordghou6 this papec we assume that an MU is roaming keys may be generated and sent to communication partners
inlo a foreign nemork domain. Then, the challengelresponse during authentication, which are used to encrypt the data of
authentication for an Mu in a foreign network can be classified communication and provide message authentication code for
into three types: intra-domain handoff authentication; session data integrity check. Therefore, the authentication mechanism
authentication; and inter-domain handoff authentication.
plays a key role to protect the data secrecy and integrity.
Intra-domain handoff authentication: When an MU crosses
the boundary of subnets in the foreign network domain with C. Effect of Aiifhentication on QoS Metrics
Besides the effect on the security. authentication also influan on-going service, an intra-domain handoff authentication
is initiated, Since there is an on-going communication session ences QoS metrics, such as authentication delay, cal1 dropping
between the MU and an AP, one session SA exists between the probability and throughput of communications.
MU and the LAS in the visiting network domain. Therefore, it
The authentication delay is defined as the time from when
is unnecessary to contact the HAS of the MU for authentica- lhe MU sends out an authentication request 10 when the MU
tion. In the case shown in Fig. I . A , the LAS, which receives receives the authentication reply. During this authentication
the authentication request from an MU, sends a challenge delay, no data for on-going service can be transmitted, which
value to the MU. The MU encrypts the challenge value using may interrupt the connections. Therefore, the call dropping
1479
Authentication
Aurheniication
B. Session Authenrlcmion
A. Inrra-domam Handoff Authentication
LAS: Local Authentication Server
C.her-domain Handoff Authentication
HAS: Home Authentication Servzr
HA:Home Agent
AP: Access Point
MU: Mobie User
Challenge/Response
Authentication
in
Public
Wireless
Access
Networks.
Fig. 1.
probability may be increased because of the extended authentication delay,
The throughput is defined as the h e effective data transmitled per unit lime. It can be greatly decreased in authentication
because of several reasons. First, the authentication delay
may cause a pause for data transmission, which decreases the
throughput. Second. the key size and complex algorithms used
in authentication affect the processing time of authentication
messages, and the attachment of message authentication code
for data integrity check will affect the payload of messages.
In summary. authentication in wireless networks has great
effects on both security and quality of service such as authentication delay, call dropping probability, and throughput.
In order lo improve the security and performance of wireless
networks, it is necessary to analyze the authentication effects
on both security and QoS metrics by taking into account
mobility and traffic patterns. To this end, we propose a
system model with assumptions and definitions of performance
meuics in the next section.
111. SYSTEM MODEL A N D METRICS
In this section. we introduce a system model to analyze
the impact of challengehesponse authentication in wireless
networks. We consider the security and system performance,
in which the security is defined with regard to security levels,
and the system performance are evaluated with authentication
delay and call dropping probabilities.
A. System Model
We consider a generic system model for wireless networks
fiom two aspects. One is to describe the authentication inter-
action between autonomous wireless networks; the other is to
illustrate the authentication within a wireless network.
The system model to describe the authentication interaction
between inter-connected wireless nelworks is shown in Fig. 2.
In this model, there are a number o f n autonomous wireless
networks. Each network domain has an LAS and an HAS,
which are cenual authentication servers in a network domain.
The trust relationships between these LASS and HASs are
maintained through an authentication architecture [14]. The
functions of the LAS, HAS, and authentication architecture are
introduced in Section 11-A. We m u m e that the LAS and HAS
are integrated together. and the authentication architecture
shares an SA with the LAS/HAS of a network domain.
We further assume that a network domain is composed of
Ad subnets of equal size, and each subnet is controlled by an
-
I
:Access Paint
SN: SubNetwork
LAS: Local Authentication Server
/
-
-
: Movement of MU
MU: Mobile User
HAS: Home Authentication Server
Fig. 2. System Model of Authentication in Wireless Networks.
AP. An LAS/HAS shares SAS with A4 APs and controls the
authentication requests from them.
The generic system model in our paper is consistent with
many practical wireless networks such as the authentication,
authorization, and accounting (AAA) architecture in Mobile
IP networks and wireless local area networks ( W A N ) E141.
Based on this system model, in order to evaluate the performance of authentication, we need to describe specific
conditions such as authenticaLion mechanism, mobility and
traffic patterns clearly .
Scenario: Assume that the challengelresponse authentication
is implemented on the generic system model with signaling
diagrams shown in Fig. 1. In this paper, we focus on the
scenario that an MU is roaming into foreign network domains.
Then, the intra-domain handoff authentication, session authentication, and inter-domain handoff authentication in foreign
networks are illustrated in Fig. 1.A, 1 .B, and 1,C, respectively.
Mobility pattern: The mobility pattern of an Mu in our paper
is represented by the residence time of the MU in one subnet,
denoted as T,. We assume that Tr i s a random variable and the
probability density function (PDF) of T,, denoted as f~,(t).
is Gamma distribution with mean l / p r and variance V [171.
Then, the Laplace transform of fT, ( t ) ,F,. (s), is:
Furthermore, if the number of subnets passed by an Mu is
assumed to be uniformly distributed between [l,MI. the PDF
of the residence time in a network domain, denoted as f ~ ,( t ) ,
1480
MU
can be expressed with a Laplace transform F M ( s )as:
AP
Resource-Req
Resource-Res
MU: Mobile User
Then, the mean vahe of residence time in this network
domain, denoled as T M ,can be expressed as:
Fig. 3. Intra-domain Handoff & Session Authentication at Security Level 1.
(3)
Security Level 1: Any MUS can send data through an
AP without authentication. When an AP receives an
authentication request, it checks the resources for this
request. In intra-domain and session authentication shown
in Fig. 3, if the resources for this service is available, the
resource approval is replied to the MU to authorize the
service. The signaling diagram for inter-domain handoff
authentication is very similar to Fig. l.C. The difference
is that the LAS needs to send registration messages lo the
HA and the HAS of the Mu through the authentication
architecture, instead of replying a challenge value to
the MU. After registration, the service is authorized
to the MU. At security level 1, the integrity, secrecy,
and resource availability cannot be protected without
cryptographic techniques.
Securidy Level 2: Authentication is implemented through
a predefined list of Media access control (MAC) addresses, and no keys are generated for subsequent communications. In this case, when an AP receives an authentication request, it requests the MAC address of the MU
and relays the MAC address to the LAS or HAS for verification, as shown in Fig. 4.If the received MAC address
matches one entry in the list, the MU is authenticated.
For intra-domain handoff authentication, the LAS has the
session SA of the MU, thus, the MLJ can be verified
at LAS. For inter-domain and session authentication, the
MU needs to be authenticated at HAS because no SA
exists at the LAS. In particular, registration is required
during inter-domain authentication. There is no protection
for data integrity and secrecy without keys distributed to
the MU. But !he network resource is slightly protecled by
.,identifying the MAC address although il can be forged
Traffic pattern: In this paper, we use call arrival rate and call
duration time to indicate traffic patterns. We assume that the
call arrival rate of an MU, which includes the incoming calls
and outgoing calls, is Poisson process with average rate A,,
and a call duration time, denoted as TD,has an exponential
distribution with mean value 1/11, Then, the PDFs of the call
inter-arrival time and call duration time, denoted as
( t )and
f ~ ,(1). respectively, become:
f T A ( t )= X ~ ~ C ’ , ~ ,
and
f T a ( t ) = qepqt,
(4)
Based on these assumptions on the mobility and traffic
patterns of the MU, we evaluate the security and QoS metrics
during authentication, which are defined next.
E. Peflormance M e t r i a
We categorize the performance meuics into security and
QoS parameters. The security parameter is represented by
security levels, at which different levels of protection are provided. Meanwhile, we consider authentication delay and call
dropping probability as the system performance for evaluation.
1 ) Security Levels: There are much quantitative analysis
of QoS in networks [IS]. [19], whereas less analysis of
security exists. This gap between the QoS and security analysis
demands quantization of security for the engineering research.
Therefore, the concept of security level becomes widely used
for security evaluation [20], [21]. The classification of security
levels in these papers is either based on the information
sensitivity, or based on the key length. In the cIassification
with the information sensitivity, if a group of users are allowed
to access most sensitive data, and the data in this group is
prohibited to expose to ocher groups, then, the security level
of this group is the highest. In the classification with respect to
key length, if an encryption/decryption process uses a longer
key than other processes, this process is assigned a higher
security level. As we can see, however, all of them do not
consider the nature of security, i.e., data integrity, secrecy, and
availability. Therefore, we argue that the nature of security
should be involved to classify the security levels.
In our paper, the securi@ level is to indicate the level of
protection provided by the authentication for quantitative analysis of security. The classification of security levels is shown
in Table I according to the security functions described in
Section 1143, i.e., protection for integrity, secrecy and resource
availability. Because of different actions in challenge/response
authentication, the protection of data integrity, secrecy, and
availability are different at different security levels.
AP: Access Point
.
?-. .easily.
1481
1
Security Level 3: Authentication is implemented with
credentials encrypted with a shared SA, and no keys are
generated for subsequent communications. In this case,
an SA between the MU and its HAS is used for interdomain handoff and session authentication as shown in
Fig. 5 . The signaling process at security level 3 is almost
the same as that at security level 2. The difference is that a
pair of challenge/response values are used to authenticate
the MU instead of the MAC address. The MU that
receives a challenge value from the LAS encrypts the
challenge value with corresponding SA. In the intradomain handoff authentication, the corresponding SA
is shared with the LAS during communication session.
Then, the LAS verifies the challenge value replied from
the MU by decrypting the response value with the SA.
TABLE I
Security Level i
Security Service
1
Integrity I Secrecy I Confidentiality I Availability Protection
No
I No I
No
I
No
I
4
MU
AP
]
Yes
Yes
I
LAS
I
1
Auh-Appr
A Intra-dontun Handoff Aulhenucauon
AP
MU
LAS
HAS
I
I
HA
Resource-Req
I
J
Session Auihenticanm
Inm-domain HandoB Authentirtion
B. Session and Inm-domn HandoffAuthcnlrcauon
LAS: Local Authentication Server MU: Mobile Usel
HAS: Home Authentication Server AP: Access Point
HA: Home Agent
Fig. 4. Signahng Diagram at Security Level 2.
A. Lnrra-domain Handoff Aulhenticauan
MU
LAS
AP
Resource-Rcq
-I
HAS
High
during inter-domain authentication. At security level 3,
the network resources can be protected by only allowing
the access of legitimate users. However, since no key is
dislributed for data transmission, the integrity and secrecy
are not guaranteed. Furthermore, the network resource
may be compromised due to lack of data integrity and
secrecy.
Securie Level 4 : Authentication is implemented with
shared SA, and keys are generated for data communication. The signaling diagram at security leveI 4 is shown
in Fig. 5 , which is similar with that at security level 3.
The difference is that keys are generated, encrypted, and
transmitted to communication partners such as the MU,
home and foreign agents. After the keys are decrypted
by the communication entities, the keys will be used to
provide encryption and message authentication code to
protect the communication. Therefore, the integrity of
data can be guaranteed, and the secrecy is protected with
data encryption. The network resource is also protected
since the identification cannot be compromised due to the
protection of data integrity and secrecy.
From Table I and description above, we can see that
the higher the security level, the better security services
the authentication provides. However, higher security levels
are achieved by applying more complicated cryptographic
techniques in the authentication process. The extra operations induce overhead that affects the QoS metrics, such
as authentication delay and call dropping probability during
authentication.
2) Average Authentication Delay: We define authentication
delay as the time from when an MU sends an authentication
request to when the MU receives the authentication reply. The
average authentication delay, T (i ) . is defined as the sum of an
authentication delay over a number of authentication requests
per unit time at security level i, i.e.,
Rmourm-Rcq
Resource-Res
High
HA
Auth-Req
3
Sesslon Aurhentication
-I
Inter-domain Handoff Auihenhcation
B. Sesam aod Ioter-domain Handoff Authenticatim
LAS:L x a l Authentication Server MU:Mobile User HA:Home Agent
HAS: Home Authentication Server AP: Access Point
Fig. 5. Signaling Diagram at Security Levels 3 and 4.
However. in inter-domain handoff and session authentication, there is no SA between the MU and the LAS. The
MU must be authenticated by the HAS. After verifying
the Mu at the HAS, the authentication approval is sent
back to the LAS. Specially, the registration is required
p= 1
where Tp(i)
is the authentication delay per operation at security level i for authentication type p, and X p is the arrival rate
of authentication requests with type p. There are three types of
authentication requests: ,13 = 1 means that the authentication
request is an intra-domain handoff authentication; ,1!3 = 2
denotes the session authentication; and, /3 = 3 represents interdomain handoff authentication.
3) Average Call Dropping Probubiliiy during Aurkentication: When an extended waiting time for authentication is
1482
induced and greater than a threshold time, the connection
will be broken [221. On the other hand, even though the
authentication delay is small and the MU is a valid user,
an authentication failure may happen regardless of security
level because of damaged credentials caused by transmission
error, packet drop at queues, attack of intruders and software
application failure.
Therefore, we define the call dropping prababiZi@ as the
probability that the service of an MU is dropped during one
authentication operation because of either extended authentication delay, or an authentication failure. When an MU roams
among subnets in a network domain, the avemge call dropping
probability, P ( i ) ,is defined as the ratio of the sum of the call
dropping probability per authentication in a unit time over
the number of authentication requests sent by the MU within
unit time at security level i. Let P ( i )denote the average call
dropping probability at security level i, it can be written as:
P ( i )=
E;=,
b[P,(i)+Pel
E;=,
XP
1
tip = 1,2,3 and i
1
Symbol
I
T,,
I Messare Drooaoation time on one hoD
Y;?
T,,
I Messnee transmission time on one hou
1 Message encryption/decryption tune on one bop
I Authentication request service and
T,,
I Authentication request service and waiting time
T,,
I
I
Ted
I
I
1,2,3,4.
:
(7)
I
T,:
II
Desaiption
I
I at the proxy authentication server
I
I
Tu,
To I
T,,
i
1
I
Authentication request service and
waiting time at th;. HAS
a pair of encryption and decryption time for 9 value
Key. generation
time at the HAS
Transmission time for the session kev
to the other communication identities such as HA
Registration request service and waiting time at HA
Y
I
Here. gt is a vector defined as:
2;
I
and q ? ( i ) = PT,(i)tT@(i)> T t h ) ,
(6)
where Tth is a threshold time, f'~~(~,(Tp(i)
> '&) is
the probability that an authentication delay is greater than
TtjLin authentication type p. P' is the probability that one
authentication faiIs due to unknown effects. Since the factors
that affect P, include many unknown factors and there is no
evidence on the pattern of attacks currently, we will use a
mean value from experiments to represent P, in the numeric
results of our paper 1231.
In summary, in order to evaluate T ( i ) and P(i) in (5)
and (6). we n e d to analyze Ao, Tp(i),
and Pp(i).
Next, we
derive these parameters based an the system model shown
in Fig. 2, assumptions described in Section 111-A, and the
definitions of the performance metrics in Section 111-B.
IV. PERFORMANCE
ANALYSIS
In this section, we analyze the impact of authentication on
security and QoS in terms of authentication delay and call
dropping probability from two key aspects, First is to observe
the relationship between the security levels and the QoS for
each authentication. Second is to obtain the arrival rates of
authentication requests. After hat, the average authentication
delay and call dropping probability defined in ( 5 ) and (6) can
be evaluated.
A. Perfonnancd Analysis per Authenticofion
At different security levels, the authentication has different
effects on the authentication delay and call dropping probability of different types of authentications.
1 ) Delay per Aiithentication: To derive the delay for different types of authentications on different security levels, we
use the signaling diagrams shown in Figs. 3, 4, and 5. We
also define a set of time parameters shown in Table I1 for
convenient description.
Then, T , ( i )can be expressed as:
Tp(i) = dp,i . Z t ,
TABLE I1
TIMEPARAMETERS
AUTHEKTICATION
= [Tpr +Tt,.
Ted,To,
T!q, T,,
TUSI
Tg,Tt,,
(8)
Z,'.g].
where all the time components are defined in Table 11. And,
dp,* are the vectors defined as follows:
= [2, 0 , 1, 0 , 0, 0. 0 , 0, 01,
[6, 2, 3, 0. 1, 0, 0 , 0 , 01,
d1,3= d1,e = [8, 4, 4, 0, 2, 1, 0, 0 , 01,
&,I = [a, 0, 1 , 0, 0, 0, 0, 0, 01.
d2,2
['2(Nh I), 2(Nh - 11, 3, 2(Nh - 2 ) ,
:2,3
[ ' l ( N h 3- 2 ) , 2 N h , 4, 2(Nh - 2 ) j
1, 1,
a2,4
[z(Nhf 2), 2Nh7 4, 2(Nh - 21, 1, 2.
& , I = [2(Nh+ l), 0 , 2. 2(Nh - l), 0 , 0 , 0.
&,2 = [ ~ ( N A
2). 2 h ' h , 3, 2(Nh 2), 2, 0,
d3,3
[z(Nh 3), 2 ( X h f I ) , 4, 2(Nh - 21,
a3,4 = [ 2 ( N h
3)) 2(Nh f I ) , 4, 2(Nh - 2 ) ,
d1,2=
+
+
+
-
+
1, 0, 0, 0, 01,
0, 0 , 01,
1, 1, 01,
0 . 11,
0, 0, 11,
2, 1, 0, 0%I],
2 , 2, 1, 1 1 11.
The coefficients in front of the time variables in & denote
!he number of time variables for each authenlicatzon. For
example, in the case of ,3 = 3 and i = 4 as shown in Fig 5,
the message for an MU to request challenge value from an
LAS must traverse through an AP on two hops first. Then,
the response value needs to be transmitted to the HAS via
N h hops since there is no shared SA between the MU and
the LAS in the case of inter-domain handoff authentication.
At this moment, a registration process is needed. Thus, a
distance of one hop between the HAS and the HA needs to
be passed by the message. Therefore, the number of hops that
the round-trip signaling messages traverse in the authentlcation
process is 2 ( N h 3). The coefficient in front of TPT Tt,
is 2(Nh -t 3 ) . On this path for authentication, there is no
encryption and decryption of messages on the hop between the
MU and the AP before authentication. Since the authentication
message traverses this hop four times, the number of hops
that we should consider the encryptionldecryption during the
authentication process is 2(Nh + 3 ) - 4 = 2(Nh + 1). Thus,
the coefficient in front of T e d is 2(Nh 1).
Similarly, since the authentication process in the case of p =
3 and t = 4 needs to pass the AP four times. the coefficient of
T,, i.e., authentication request service and waiting time, is 4,
Because the authen ticauon message crosses the intermediate
1483
+
+
+
(9)
authentication servers 2(Nh - '2) times, the coefficient of Tsq,Recall that the PDFs of Tsq.T', T,,. and TTgare assumed to
i.e., authentication request service and waiting time at a proxy be iid with the same definition as shown in ( 10). and the other
authentication server. is 2jNh -2). The authentication message
also traverses the HAS twice when registration is needed.
'Thus, the coefficient of T,, i.e., authentication request service Furthermore, with these PDFs f p ( i ) , Pp(i)can be o b t b e d in
and waiting time at the HAS, is 2.
different cases.
Since the authentication in this case also needs one lime
To summarize, we have obtained authentication delay and
registration at the HA, the coefficient for Trg,i.e., registration
call
dropping probability for one authentication operation.
request service and waiting time at an HAS? is 1. Because
However,
in order to obtain the average authentication delay
a key is generated at the HAS for the communication o f the
and
call
dropping
probability defined in ( 5 ) and (6). we need
MU, the coefficient of Tg, i.e.? key generation time at the
to
evaluate
the
arrival
rates of different types of authentication
HAS, is 1. The HAS also needs to transmit a corresponding
requests,
i.e.,
Xp,
(
p
=
1,3,3).
key to the MU'S communication partners, thus the coefficient
of T,,, i.e., transmission time for the session key to the other
communication identities such as HA, is I . In addition, two B. Arrival Rates of Aiitlienticution Requests
pairs of encryption and decryption time are needed between
Since the authentication requests are categorized into three
the MU and its HAS. One pair is for encrypting and decrypting types: intra-domain handoff authentication. session authenticathe challenge/response values; the other is for encrypting and tion, and inter-domain handoff authentication, we analyze the
decrypting the session key. Thus, the coefficient of Tu,, i.e., arrival rates of different types of authentication, i.e., Ap! (P=
a pair of encryption and decryption time for a value, is 2.
1;2 , 3 ) , based on the mobility and traffic patterns of the Mus.
For the other cases of authentication processes, they follow
1) Arrival Rate of Intra-Domain Handof Aurkentication,
the same analysis and can be obtained From Figs. 3,4, and 5 . XI: The intra-domain handoff authentication happens when
2) Call Dropping Prubabilip: In Section 111-B.3, we con- an MU crosses the boundaries of subnets in a network domain
sider a call is dropped during authentication if the waiting with an on-going service. In order to calculate the arrival rate
time for authentication is greater than a threshold value of intra-domain handoff authentication requests, we define four
Tth, or an authentication failure happens. In (6), we use a events, in which calls will happen:
mean value from an experiment for P,, due to the unknown
YI is the event that an MU starts a connection before
distribution model. Therefore, in order to evaluate P'(i), ( p =
entering the network domain, enlers the network domain
1; 2 , 3 and i = 1,2,3,4). the PDF of the authentication delay
with the on-going connection and this connection ends
shown in (7) needs to be evaluated.
before the MU moves out of the network domain.
In (7), we only consider the time variables, Tsp,T,, Tu,
Yz is the event that an MU starts a connection within
and TTgas the random variables because the variance of the
current network domain and this connection ends before
other time variables are small. Thus, to find Pp(i) becomes
the MU moves out of the network domain.
to find the PDFs of the different combinations of Tsg,
T,,
Y3 is the event that an MU starts a connection within
T,, and Trgin To(;).For simplification, we consider that: (1)
current network domain and this connection ends after
M / A 4 / 1 queues are applied at APs, authentication servers, and
the MU moves out of the network domain.
HAS; (2) The PDFs of Tsq,T,, T,, and Trs are independent
y4 is the event that an MU starts a connection before
identical distribution (iid). Then, the PDF of TsqrT,, T,, and
entering the network domain, enters the network domain
Trg, i.e., w ( t ) ,can be shown as [24]:
with the on-going connection, and the connection ends
w ( t )= (ps - A S ) , - ( ~ s - y
(10)
after moving out of the network domain.
where ps and A, are the service and arrival rates of authenmen, the arrival rate of intra-domain handoff authenlication
tication requests, respectively. Furthermore, the PDFs of the requests, AI, can be written as:
4
different combinations of T,,, T,, T,,, and T,, in T p ( i ) , i.e.,
f p ! i ( t ) , can be expressed in (1 11, shown on next page, as the
L p r j ( r x a j l - 1))
(13)
j= 1
components of a matrix f ( t ) .
In (1 l), the row represents the index of authentication type where A, is the call arrivd rate defined in (4),Prj is the
A
p, and the column is the index of security level i. r(5) =
is the average number
probability that event y3 happens,
s x - I e -a ds, and = ps--Xs. Thus, f p , $ ( t ) can be obtained
of subnets passed by an MU in current network domain in
from the combination of Tsq,T,, Tu,
and T,, in Tp(i).
For event q, (j = 1 , 2 , 3 ,4). [Xajl - 1 represents the average
example, in the case of p = 3 and i = 4, according to (7), (X), number of intra-domain handoff authentication in event Yj.
and (9), T3(4) can be written as:
Since the intra-domain handoff authentication only happens
when
an MU crosses the boundaries of subnets inside a
T3(4)= 2(Nh 3)(Tp, Z,)
2(Nh I)&
4Ta
network
domain with an on-going service, the average number
2(Nh - 2)T&f 2Tvf 2Tus Tg T t a -k T T g . (121
of intra-domain handoff authentication is equal to the average
number of subnets passed by an MU minus one.
raJ
so"
+
+
+
+
+ +
+
+
1484
The time diagrams of the events, 15, (j= 1 , 2 , 3 , 4 ) , are
shown in Fig. 6, where 1; is the call beginning time, ta is
the call ending time, t: is the time when an MU enters the
network domain we are investigating, t:l is the time when
an MU leaves the network domain we are investigating, and
tkr is the beginning time of the residual time of the residence
time in a network domain. Therefore, the probabilities of these
events, P,j, (j= 1:2; 3; 4), can be derived as follows.
defined in (2),
have the Laplace transform of the PDF of TA,~
Pr(T,,. 5 T,If)can be determined by:
1
W
pv(TDr
where XI
5 TA$)
(17)
fS,( t ) d t :
5 TA!- Tor, and f ~( t ,) can
be computed from:
+
B. Event Y 2
A. Event Y I
I
Here, l / v is the average call holding time, q / ( q s) is the
Laplace transform of the PDF of T D ~and
, F A J ( S is
) the
Laplace transform of the PDF of TA4 defined in (2).
Thus, PT1can be calculated by substituting (15), (I6), (17)
into (14). Next, we need to derive Pr2 from Fig. 6.B as:
Thfr
Pr2 = P,(TD
=
(19)
where X2 T M-~T D ,fx,(t)and f ~ , . ( t )are the PDFs of
Xz and T M ~respectively,
,
which can be obtained by:
D : Leave a Network Domain
b : Enter a Network Domain
: Start a Call
TD: Call Duration Time
0 : End a Call
Tb :Residual Time of Call Duration Time
Tu : Residence Time in a Network Domain
TM,: Residual Time of the Residence T i m in a Network Domain
fX-2
(t)
2 - 1
{
F M r (SIT}
7
f ~ r ( t ) 2-' {FMriS)},
Fig. 6. Time Diagrams of Events
tz
Jrf s , ( t ) d t . JrX,te-X-tfiMr(t)dt,
e
D.Event Y4
C. Event Y 3
< TMTj . KjtL, 5 t : < tkT+ T M r )
According to the time diagram in Fig. 6.A, and denote At =
- t:, we have:
(20)
where l / q is the average cat1 holding time, and F M , ( s ) is the
Laplace transform of the PDF of TA!,.,
the residual time of the
residence time in a networkdomain. FM,(s) is determined by:
is defined in (3), and F M ( s )is defined in (2).
Moreover, we can obtain Pr3 from Fig. 6.C:
(14) where
where I(t: + At, t:) is the number of calls that arrive in
the time interval [I$ t! At). Since we assume that the call
arrival rate is a Poisson process, P,-[I(tz At, t:) = I ] can
be determined by:
+
+
P,[l(t: + At, t:) = 11= A,AtepxuAt,
(15)
where A, is the average arrival rate of the calls. In (141, TDis
the call duration time with PDF defined in (4), and T ~ .isI the
residence time of an MU in the network domain with Laplace
transform of PDF in (2). Thus, we have:
P,(TD > At) =
Pr3
s9:
&,(t)dt = e -7At ,
=
Furthermore, TD, is the residual time of the call duration
time with the same PDF as TO defined in (4) due to the
memoryless property of exponential distribution. Since we
2 t: < t:, 4-hT)
Jrfx.,(t)dt JrX,te-x-tjMr(t)dt,
(22)
f
) PDF of T M defined
~
where X3 2 TD - TMr,f ~ ~ (is tthe
in (20): fj;,(t) is the PDF of X3, which can be obtained by:
where f;;r.rr(s) is defined in'(21), q is defined in (4).
Finally. Pr4 can be determined from Fig. 6.D as follows:
(16)
where f ~ (,t )is defined in (4), 1/0 is the average call holding
time and At = t: - t,".
= P,(TD > T h T ). P,(tk,
Pr4
So"
Pr[l(t:+ At;t,")= 11 Pr(TD > At)d(At)
'
(24)
.pT(Tor > T I M ) ,
where P, [I(tz+ At: tz) = 11 is shown in ( 1 9 , P,(TD > At)
defined in (16). and ~,(TD,
> TM)= 1 -Pr(TDr I
TIM),
where P,(TD, 5 TA<)
is defined in (17).
IS
1485
I t. I
k TD 4
i-TTIkA
TD
b u - - - -
-1
tI
I:
The Laplace transform of the PDF o f t , , Ft,-(s). is:
tNal
tl
t?
(Ns2-1
.
tl
-
t2
-
1U
tb3-l
4
TD
D
tt
tNa3
C. Time Diagram for Na 3
t?
tNa4-I
tNp4
D. l i m e Diagram for Naa
FAf r ( S )
TD: One Call Duration Time t i : Residence Time in a Subnet i
TM,: Residual Time of the Residence Time in a Network Domain
D : Leave a Network Domain
b : Enter a Network Domain
Fig. 7.
1 - Fr(s)
(28)
1
S
where 1/pT is the average residence time of an MU in a
subnet. F,(s) is defined in (1). In (27), ti is the residence
time of an MU in subnet i , which is assumed to be Gamma
distribution with Laplace transform of PDF defined in (1): and
Na3 is the random number of the subnets passed by an MU
in the current network domain for the event 15.
Based on the relationship in (27): we can obtain:
I-TMA
k+---~~ I-
pr
tNaZ
3.Time Diagram for Naz
A. Time Diagram for Nai
I
%(s)
U----
tad-1
e
Ft, (S)GIVo~
- 1( z1(2=Fp(s)
1
(29)
where pAIT
( s ) is defined in (211, 17tT( s) is defined in (281,
G,R,-~~--~(,Z)
is the generating function of the PDF of ArR3- 1.
Then, N a 3 can be obtained by:
Time Diagram for Number of Subnets Passed by for On? Call.
-
+1
~GX,~-I(~)
l~=i
ATR3=
Therefore, we have calculated P T j ,( j = 1,2?3,4). In order
to evaluate AI.we will evaluateFUj, ( j = I, 2: 3,4). The time
diagrams to evaluate Ea3are shown in Fig. 7.
In order to evaluate Taland F a 2 , we consider a theorem
in [25].Given call holding time and subnet residence time with
Gamma distribution, the average number of subnets passed by
an MU within a call, E, is determined by:
where 1/a is the average residence time of an MU in a subnet,
pf is the probability that a handoff call is blocked, f*(s) is
the Laplace transform of the PDF of the residence time of an
MU in a subnet, f:(s) is the Laplace transform of the PDF
of the call holding time, 6, is the singular points of fz(-s),
and Res,,, denotes the residue at a singular point s = p .
In the events Y1 and Yz,
the call duration time in a network
domain are TD, and TO,respectively, which are exponential
distribution, one special case of Gamma distributions. Therefore, Taland Tazcan be calculated with (25). By assuming
that p f = 0, we can carry out pal and Waz as:
where 1/77 is the average call duration time of h e MU and pr
is the average residence time of the MU in a subnet.
On the other hand, note that T M and
~ TA{are not Gamma
distributions, we cannot obtain ma3 and radwith (25). Thus,
we derive mu3 and na4next.
From Fig. 7.C, the relationship between different time
components can be written as follows:
i=2
where T'f, and t , are the residual time of the residence time
of an MU in a network domain and in a subnet, respectively.
-
2M2-M-1
12TMClT
(M;l)(T+l)
I 1,
(30)
Y
where T K is
, ~defined in ( 3 ) , M is the number of subnets in
current network domain, l / p r is the average residence time
that an MU stays in a subnet, and y is defined in (I).
According to Fig.7.D, x,4 is equal to the average number
of subnets that an MU passes in a foreign network domain.
Recall that the number of subnets that the MU passes by in a
is assumed to be uniformly distributed
network domain, hrsn,
between 1 and Ad, i.e.,
1
P(N,, = m )= -,
M
m. = 1: 2 , . . . , M .
(31)
Thus, we have:
maj
Now we have obtained all
at event 15, j = 1,2, 3; 4.
Since we have calculated P,j, j = 1,3,3,4, in (14), (19), (22),
and (241, respectively, we can evaluate XI by substituting the
values of Prj and N a j , j = 1,3,3,4,into (13). Next, in order
to obtain T ( i )and P ( i ) defined in (5) and (6), we need to
evaluate A? and X3.
2) Arrival Rate of Session Authentication, X2: After an MU
has moved into a network domain, a session authentication is
initiated whenever a call arrives. Therefore, the arrival rate of
session authentication requests for one MU, i.e., X2, is equal
to the call arrival rate of an MU,
A2
= A.,
(33)
3) Arrival Rare of Inter-Domain Handoff Authentication.
Ay: The inter-domain handoff aurhentication requests happen
when an MU enters the network domain with an on-going
service. Therefore, the arrival rate of inter-domain handoff
authentication requests, AY, can be obtained by:
1486
A3
=
X,(P,l
4-P r 4 1 ,
134)
where A, is the calt arrival rate assumed in (4), P,I and
Pr4 are the probabilities that events 1; and Y* occur, which
are defined in Section IV-B.l and evaluated in (14) and (24),
respectively.
B. Efects of Mobiliy Partern at DifSerent Security Levels
The effects of mobility pattern on the authentication delay
and call dropping probability are shown in Figs. 8 and 9.
In these figures, we illustrate the relationships between the
Thus, we have obtained the arrival rates of authentication residence time of an Mu in a subnet, authentication delay,
requests for intra-domain handoff authentication, session au- and call dropping probability, respectively.
thentication, and inter-domain handoff authentication. Since all
Fig. 8 reveals the effect of residence time on the authenthe paramcters in ( 5 ) and ( 6 ) have been evaluated, the impact tication delay. As we can see. authentication delay decreases
of authentication on security and the system performance can with the increase of the residence time of an MU in a subnet.
be observed clearly through T ( i )and P ( i ) .
This trend is due to the decrease of the intra-domain handoff
authentication requests. The higher security levels cause more
V. NUMERICALRESULTS
authentication delay because of more operations needed for
In this section, we evaluate the effects of mobility and secure services. The improvement of authentication delay by
traffic patterns on authentication delay, T ( i ) ,and call dropping changing security levels from 4 to 3 is around 0.1 seconds,
which is about 18% of the delay at security level 4 when the
probability, P(i),at different security levels.
residence time of an MU in a subnet is 27 minutes.
A. Assrimprions and Parameters
The effect of call dropping probability in authentication is
shown
in Fig. 9. The call dropping probability increases with
The numerical results are calculated based on the assumptions introduced in Sections 111 and IV-A.2. In Section 111, we the increase of the residence time of an MU in a subnet. When
consider an MU roaming in a foreign network shown in Fig. 2. the residence time of an MU in a subnet increases, the arThe residence time of the MU in a subnet of the network rival rate of intra-domain handoff authentication requests wilI
domain is assumed to be Gamma distribution with the mean decrease. Then, the session authentication requests become
value l/py. The call arrival rate of the MU is assumed to be the major part of authentication requests. Note that the call
Poisson process with mean value l / A u , and the caII duration dropping probability for session authentication is much higher
time of the MU is assumed to be exponential distribution with than that in intra-domain handoff authentication due to the
longer authentication delay caused by remote authentication.
mean value 1/77.
In Section IV-A.2, we further assume that M / M / 1 queues The call dropping probability will approximate that in session
are used at APs, authentication servers, and HAS with service authentication if the residence time of an MU approaches
rate pLsand arrival rate of authentication requests A$, Let infinity. In other words, the upper bound of the call dropping
[ = ps - A., According to (lo), the service and waitlng time probability can be achieved when the authentication requests
at an AP, authentication server, and HA, i.e.. T,, T,,, and Tu, are all session authentication requests. Similar with the delay,
become random variables of identical exponential distribution call dropping probability is greatly affected by the security
with mean value of l/[. The parameters to evaluate the levels. When the security level is leveraged from 3 to 4, call
dropping probability increases around 0.0045, which is about
authentication delay are shown in Table 111.
50% of the call dropping probability at security level 3 when
TABLE 111
the residence time of an MU in a subnet is 27 minutes.
PARAMETERS FOR EVALUATIONON
Q O S METRICS
Parameters for Authentication Delay
Tth
I
Tpr
3s I 40 us
I
Tt, 1 T e d I Tg I M I “I
I 20ms I Zms I 2ms I 120 I 10
Parameters for Random Variables
ir Authenticatim Time at Security Level 1
-t
o
AuthenbcatimTime at Secumiy Level 2
Authentdcation Time at Securily Level 3
0 &55, +- AuthenhcattmTrmeatSecurilyLevel4
i
In this table, the values of the time variables are critical
because they are related with the call dropping probability.
When the maximum authentication message size is 4096
bytes [3], [26], the transmission delay is about 20 milliseconds
with the assumption of 2 Mbps link capacity [27]. The values
of Ted and Tg are obtained from existing research [27], [ZSI.
By assuming one network domain is about 100km2 with
radius 6 k m , the value of the propagation time, T,,, can be
determined by the distance between two LASS as shown in
Table 111.
1487
0.45 . ..
.....:.
1 :
04l
6
g
;
A
..... .... ........., .r .. . ... .
... . .... .*
...... .
.f
........, . c. .. . .. -’
I
12
15
18
21
24
27
30
Residenw Time in a Subnet (minules)
Fig. 8. Authentication Time vs. Residence Time in a Subnet.
Call Dropping Probablity vs Residence Time
x
to A,. Thus, A, disappears in (6), which is P(i)’s definition
equation. Then, once the PDFs of the call duration time and
the mobility patterns of the MU are known, the call dropping
probability of the MU is a constant at varied call arrival rates
as shown in Fig. 11. The call dropping probability at higher
security levels is more than that at lower security levels. For
example, the call dropping probability at security level 4 is
about 56% more than that at security level 3.
Securliy Level 1
Catt Dropping Probability at Security Level 2
Call Dropping Probability ai Security Level 3
4Call Dropping Probabiiity at
16
-+
o
.. .
. ...
:
.
..
‘6
0
,-.- -.+-.- --?--
-.d
Ad.-’
,
12
15
21
18
24
27
30
Resldence Time in a Subnel Iminutesj
Fig. 9.
Call Dropprng Probability vs. Residence Time in a Subnet.
C. Eflect of Traflc Load at Dinerent Secwiry Levels
The effects of traffic pattern on the authentication delay
and call dropping probability at different security levels are
demonstrated in Figs. 10 and 11.
Fig. 10 shows that the authentication delay increases with
the call arrival rate of an MU. As shown in (3,the authentication delay is proportional to the call arrival rate A,
since Xp, ( p = 1 , 2 , 3 ) are proportional to .A, Moreover, a
higher security level causes longer delay than a lower one.
For example, if the security level is changed from 1 to 2, the
authentication will need about 29% more delay than that at
security level 1 .
Auttmnticatm Time vs. Call ArrNal Rate
w21
,
,
‘$05
006
007
,
,
1
3
4
Securrty Levels, i
Fig. 11.
Call Dropping Probability vs. Security Levels.
VI. CONCLUSION
In this paper, we investigated the impact of authentication
on security and quality of service (QOS) in combination of
mobility and traffic patterns, which are critical to deliver secure
and efficient services in wireless IP networks. We analyzed
the system performance with respect to authentication delay
and call dropping probability at different security levels based
on a system model and challengelresponse authentication
mechanism. To our best knowledge, our study is the first work
on providing a quantitative analysis of the security and quality
of service, which is of extreme importance to the adaptation
of new security solutions EO various mobile environments.
Therefore, this work provides an in-depth understanding of
the authentication impact and reveals a framework for future
design of efficient authentication schemes.
,
008 0 0 9 010 0 1 1 012
Call Anrval Rats (L”,tlmedminme)
2
REFERENCES
013
[I] A. Arumugam, A. Dwfexi. A. Nix, and P. Fletcher, “An Investigation
014
Fig. 10. Authentication Time vs. Call Arrival Rate.
As for the call dropping probability at different call arrival
rates, the call arrival rate of an MU does not affect the call
dropping probability. As we can see in (6), P(i) for security
level i is average call dropping probability computed in the
cases of intra-domain handoff authentication, session authentication, and inter-domain handoff authentication. As shown
in (131, (33, and (34, X p , ( P = 1 , 2 , 3 ) are all proportional
121
[3]
[4]
151
1488
of the Coexistence of 802.11g WLAN and High Data Rate Bluetooth
Enabled Consumer Electronic Devices in I n d m Home and Office Environments,” IEEE Transuctiam an Conrumer Electronics, vol. 49, pp. 587596,August 2003.
L. Salgarelli. M. Buddhikot. J . Garay, S. Patel. and S . Miller, “The
Evolution of Wireless LANs and PANS *Efficient Authentication and Key
Distdbution in Wireless IP Networks,” IEEE Persoml Communications
on Wireless Comrmtnicarions, vol. 10, pp. 32-61, December 2003.
P. Calhcun, 1. Loughney, E. Guttman. G. a m ,and J. Arkko, “Diameter
3ase Protocol,” drqF-ie$aan-diameteer-17.rrt, December 3002.
S. Jacobs, “Mobile IF Public Key Based Authentication:’ dr@-jmobsmo~ileip-pki-~~ucrh-o?.rxr,
Milrch 1999.
C. Perkins and P. Calhoun, ”Mobile lPv4 ChallengeRespnse Extensions,” RFC3012. November 2ooO.
161 IEEE 802.I 1 Workkg Group. http://grouper:ieee.arg/groups/ga2/1 I /
i d e x hrmi.
[7] V. Gupta, S . Gupta, and S. Chang. “Performanm Analysis of Elliptic
Curve Cryptography for SSL.” in WSe’02-ACM Workshop on Wireless
Securzty. September 2002.
[RI W. Kim and H.Afifi. “Improving Mobile Authenticadon with New AAA
Protocols.” in IEEE lnremational Confermce on Cumunicariarzs. vol. 1,
pp. 497-501, 2003.
[9] W. Simpson, “PPP Challenge Handshake Authentication Protocol
(CHAP),” RFC1334. August 1996.
[lo] S. Shieh, E Ho. and Y . Huang, “An Efficient Authentication Protocol
for Mobile NetwMks,” Joumal of Informarion Science and Engineering.
vol. 15. pp. 505-520. 1999.
[ I l l W. Liane and W. Wang. “A Cost-Aware Control Scheme for Efficient Authentication in Wireless Networks.” in I j t h IEEE Inremrional
Sqmposiuni on Persond. Indoor and Mobile Radio Communications,
PIMRC’OJ., December 2004.
[12] B. Aboba and D. Simon, “PPP EAP TLS Authentication Protocol.”
RFC2716, October 1999.
1131 L. Dell’Uomo and E. Scarrone, “The Mobility Management and Authentication/Authorization Mechanisms in Mobile Networks beyond 3‘3.’’
in Personal, Indoor and Mobile Radio Communications. 2001 l?fh IEEE
InJernalionnl symposium on. vol. 1. p p ~~ 4 4 4 4 8 .September 7001.
[14] S. Glass. T. Hiller, S. Jacobs, and C. Perkins. “Mobile IP Authenticahon.
Authorization and Accounting Requirements.” RFC2977. October 2000.
[! SJ hltp://sbandar~.ieee,org/getieee8Ol/do~~tn/oad/80,7.
JX-2001.pdf.
[ 161 W. Stallings, “Network Security Essentials.” Applications rmd Smndurds,
’
2000.
[17] W. Wang and I. Akyildiz. “Intersystem Location Update and Paging
Schemes for Multitier Wireless Networks,” in Proc. of ACWIEEE MobiCom’ZODO. pp. 99-109. August 2000.
[18] S . Das. E. Lee. K. Basu. and S . Sen. “Performance optimization of
VoIP calls over wireless links using H.323 protcco~,”IEEE Trmtsacfiom
on Cumpurers, vol. 52. pp. 742-752. June 1003.
[I91 Y. Xiao and 3. Rosdahl. “Performance Analysis and Enhancement for
the Current and Future EEE 802.11 MAC Protocols,” ACM SIGMOBILE
Mobile Compuring and Communications Revim (MCCR). special issue
on Wireless Homc Networks. vol. 7. pp. 6-19. April 2003.
[201 E. Berho+ S. Jajodia. L. Mancini, and I. Ray, ”Advanced Transaction
Processing in Multilevel Secure File Stores,” IEEE Trmsacfiunr on
Knowledge a d Data Engineering. vol. 10, pp. 120-135. Feburary 1998.
[21] S . Sutikno and A. Suva, “An Architecture of F(22N) Multiplier for
Elliptic Curves Cryptosystem,” in Proceedmgs. ISC4S zoo0 Geneva on
Circru‘rs and Systems. vol. 1 , pp. 279-282. May 2000.
[22] W. Wang and 1. Akyildiz. “A New Signahng Protocol for Intersystem
Roaming in Next-Generation Wireless Systems,” IEEE J o u m l on Selecfed A r e a zn Communicnlions. vol. 19, pp. 2040-2052, October 2001.
[23] h t t p : / / ~ . p a g a n i n i . n e ~ ~ ~ p e r l n o d e - l . h f m l .
1241 D~Gross and C. Harris in F ~ a m e ~ofl Queldeing
s
n2eav, 1974.
[25] Y. Fang, I. Chlamtac, and Y.Lin;, “Channrt Occupancy Times and Handoff Rate for Mobile Computing and PCS Networks.” IEEE Trmrsuctions
on CompuKer, vol. 17, pp. 679-692, June 1998.
[26] P. Calhoun, T. Johansson, and C. E. Perkins, “draft-ietf-aaa-diametermobileipl3,txt,” IETF AAA Working Group, October 2002.
(271 A. Hess and G. Schafer, “Performance Evaluation of
AAA I Mobile IP Authentication,” in http://w-tknee.tub e r l i n . d e ~ u b l i c a t i ~ ~ ~ ~ e2002.
rs~~~Z~2~~~
[28] K. Michael, C. Robert, and D. Gary, “Harris 2G Encrgtion Engine
Psrformance Measurements,” in Harris Corporatiom R F Communicalions
Division Technical Reparr, RFCD MDO4. October 2004.
1489
Download