Authentication traffics modeling and analysis in next generation wireless networks

被引:1
|
作者
Zhang, Yan [1 ]
Xiao, Shaoqiu [2 ]
Zhou, Mingtuo [3 ]
Fujise, Masayuki
机构
[1] Simula Res Lab, N-1325 Lysaker, Norway
[2] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[3] NICT Singapore, Wireless Commun Lab, Singapore, Singapore
来源
关键词
third generation; security management; UMTS; authentication and key agreement (AKA); mutual authentication; SGSN; HLR/AuC; location update; registration area residence time; registration area;
D O I
10.1002/wcm.477
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access security is an indispensable component in the future generation wireless networks to enable the trusted communications. During the User Equipment (UE) access procedure, the authentication overhead analysis is able to provide insights in understanding the security management performance. To unify the model for analyzing the authentication traffics under different location management schemes, we introduce the concept location update inter-arrival time. Furthermore, based on the UE's typical behavior, we propose a system model and define the metric number of User Authentication Request (UAR) in SGSN residence time to evaluate the authentication cost. Numerical results are illustrated to show the interaction between the parameters and the performance metrics. The sensitivity of call arrival process and the effects of location management schemes are also discussed. Copyright (C) 2007 John Wiley & Sons, Ltd.
引用
收藏
页码:615 / 625
页数:11
相关论文
共 50 条
  • [1] A Study on Evaluating Authentication Traffics in the Next Generation Wireless Networks
    Zhang, Yan
    Zhou, Mingtuo
    Xiao, Shaoqiu
    Fujise, Masayuki
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 5517 - 5521
  • [2] Modeling of Wireless Traffic Load in Next Generation Wireless Networks
    Manzoor, Sohaib
    Bajwa, Khalid Bashir
    Sajid, Muhammad
    Manzoor, Hira
    Manzoor, Mahak
    Ali, Nouman
    Menhas, Muhammad Ilyas
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [3] Deep Analysis Of Enhanced Authentication for Next Generation Networks
    Gouda, Mamdouh
    [J]. INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2010, 2 (02) : 37 - 52
  • [4] Next generation wireless networks
    [J]. Bell Labs Tech J, 2 (88-96):
  • [5] Performance evaluation of IKEv2 authentication methods in next generation wireless networks
    Faigl, Zoltan
    Lindskog, Stefan
    Brunstrom, Anna
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (01) : 83 - 98
  • [6] A formal analysis of authentication protocols for mobile devices in next generation networks
    Aiash, Mahdi
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2938 - 2953
  • [7] Enhanced Authentication Mechanism for Next Generation Networks
    Gouda, Mamdouh
    Haggag, Mohamed
    [J]. 2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 288 - 295
  • [8] A generic framework for mobility modeling and performance analysis in next-generation heterogeneous wireless networks
    Zahran, Ahmed H.
    Liang, Ben
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2007, 45 (09) : 92 - 99
  • [9] Radios for next generation wireless networks
    Rofougaran, AR
    Rofougaran, M
    Behzad, A
    [J]. RAWCON: 2004 IEEE RADIO AND WIRELESS CONFERENCE, PROCEEDINGS, 2004, : 1 - 4
  • [10] Security in next generation wireless networks
    Xiang, Yang
    Zhou, Wanlei
    Wang, Haining
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (01) : 1 - 3