Proceedings of the 6th ACM international symposium on Mobility management and wireless access
Secure and efficient IPv4/IPv6 handovers using host-based identifier-locator Split
SoftCOM'09 Proceedings of the 17th international conference on Software, Telecommunications and Computer Networks
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Computer Networks: The International Journal of Computer and Telecommunications Networking
Performance analysis of HIP diet exchange for WSN security establishment
Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
IEEE Communications Surveys & Tutorials
Toward Software-Defined Cellular Networks
EWSDN '12 Proceedings of the 2012 European Workshop on Software Defined Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
The fourth generation of 3GPP networks is evolving toward the realization of true global mobile broadband services. This stimulates the appearance of new applications, such as remote sensing and controlling services running on resource-constrained wireless devices, but also comes along with new challenges regarding performance and cost of the whole system, involving the requirement for lightweight security services. This paper analyzes the suitability of a recently developed protocol, i.e., the Host Identity Protocol using Diet Exchange extended with Authentication and Key Agreement, as a new option providing lightweight unified network access service in 3GPP Evolved Packet Core and replacing Internet Key Exchange version 2 with EAP-AKA. The proposed technology is compared with five other Layer-3 authentication methods under security, performance, deployment and functionality related criteria and trade-offs of the alternatives are analyzed. The results show that it is worth using this recent authentication method in scenarios where low performance overhead and support of extra functionalities such as multi-access capabilities are important. Consequently, the concept of a new secure data tunneling option is proposed for these scenarios for distributed Evolved Packet Core.