Potential Fraudulent Usage in Mobile Telecommunications Networks
IEEE Transactions on Mobile Computing
Implementing Automatic Location Update for Follow-Me Database Using VoIP and Bluetooth Technologies
IEEE Transactions on Computers
Analytical model for authentication transmission overhead between entities in mobile networks
Computer Communications
Broadcast Approach for UMTS Mobility Database Recovery
IEEE Transactions on Mobile Computing
Performance analysis of credit re-authorization schemes in UMTS online charging system
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks
Wireless Personal Communications: An International Journal
Modeling location management in wireless networks with generally distributed parameters
Computer Communications
How to secure multi-domain wireless mesh networks
Wireless Networks
Improved authentication scheme in W-CDMA networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems
The Journal of Supercomputing
Hi-index | 0.01 |
In the Universal Mobile Telecommunication System (UMTS), authentication functions are utilized to identify and authenticate a mobile station (MS) and validate the service request type to ensure that the user is authorized to use the particular network services. The authenticating parties are the authentication center (AuC) in the home network and the MS. In the UMTS, the serving general packet radio service support node (SGSN) accesses the AuC to obtain the authentication data, and delegates the AuC to perform mutual authentication with the MS. Since the cost for accessing AuC is expensive, the SGSN may obtain an array of authentication vectors (AVs) at a time so that the number of accesses can be reduced. On the other hand, if the size K of the AV array is large, the AV array transmission from the AuC to the SGSN may be expensive. Thus, it is desirable to select an appropriate K value to minimize the authentication network signaling cost. We propose an analytic model to investigate the impact of K on the network signaling traffic, which is validated by simulation experiments. Then, we propose an automatic K-selection mechanism that dynamically selects the size of the AV array to reduce the network signaling cost. Our study indicates that the automatic K-selection mechanism effectively identifies appropriate size of the authentication vector array.