2007
DOI: 10.1016/j.comcom.2007.02.001
|View full text |Cite
|
Sign up to set email alerts
|

Analytical model for authentication transmission overhead between entities in mobile networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 3 publications
0
12
0
Order By: Relevance
“…If there are m MSs in a VLR/SGSN, then the VLR/SGSN must store L * m authentication vectors. Therefore, a space overhead occurs [2].…”
Section: Umts Aka Description and It Weaknessesmentioning
confidence: 99%
See 4 more Smart Citations
“…If there are m MSs in a VLR/SGSN, then the VLR/SGSN must store L * m authentication vectors. Therefore, a space overhead occurs [2].…”
Section: Umts Aka Description and It Weaknessesmentioning
confidence: 99%
“…The SN consists of the visited location register (VLR) and the Serving GPRS Support Node (SGSN). The VLR handles circuit switched traffic, but SGSN handles the packet switched traffic [2,4].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations