Fundamentals of queueing theory (2nd ed.).
Fundamentals of queueing theory (2nd ed.).
Mobile user location update and paging under delay constraints
Wireless Networks
Channel Occupancy Times and Handoff Rate for Mobile Computing and PCS Networks
IEEE Transactions on Computers
Intersystem location update and paging schemes for multitier wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
Performance analysis of elliptic curve cryptography for SSL
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Advanced Transaction Processing in Multilevel Secure File Stores
IEEE Transactions on Knowledge and Data Engineering
Ticket Based Authentication and Payment Protocol for Mobile Telecommunications Systems
PRDC '01 Proceedings of the 2001 Pacific Rim International Symposium on Dependable Computing
Performance evaluation of public key-based authentication in future mobile communication systems
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
Efficient authentication and key distribution in wireless IP networks
IEEE Wireless Communications
Joint source-channel multistream coding and optical network adapterdesign for video over IP
IEEE Transactions on Multimedia
IEEE Transactions on Consumer Electronics
Adaptive radio for multimedia wireless links
IEEE Journal on Selected Areas in Communications
A new signaling protocol for intersystem roaming in next-generation wireless systems
IEEE Journal on Selected Areas in Communications
Performance study of IMS authentication procedures in mobile 3G networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
One-Pass EAP-AKA Authentication in 3G-WLAN Integrated Networks
Wireless Personal Communications: An International Journal
IEEE Transactions on Wireless Communications
Hi-index | 0.00 |
The emergence of public access wireless networks enables ubiquitous Internet services, whereas inducing more challenges of security due to open mediums. As one of the most widely used security mechanisms, authentication is to provide secure communications by preventing unauthorized usage and negotiating credentials for verification. Meanwhile, it generates heavy overhead and delay to communications, further deteriorating overall system performance. Therefore, it is very important to have an in-depth understanding of the relationship between the security and quality of service (QoS) through the authentication in wireless networks. In this paper, we analyze the impact of authentication on the security and QoS quantitatively. First, a system model based on challenge/response authentication mechanism is introduced, which is wide applied in various mobile environments. Then, the concept of security levels is proposed to describe the protection of communications with regard to the nature of security, i.e., information secrecy, data integrity, and resource availability. Third, traffic and mobility patterns are taken into account for quantitative analysis of QoS. Finally, we provide numerical results to demonstrate the impact of security levels, mobility and traffic patterns on over-all system performance in terms of authentication cost, delay, and call dropping probability.