2005
DOI: 10.1016/j.comnet.2004.10.016
|View full text |Cite
|
Sign up to set email alerts
|

On performance analysis of challenge/response based authentication in wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(36 citation statements)
references
References 27 publications
0
36
0
Order By: Relevance
“…The AAA server performs ADR, since it does not possesses any AV for the involved MS. As a result, AuC generates a batch of 4 AVs with SQN AV = 13, 14, 15, 16 respectively, sets SQN HN = 16, and coveys them to the AAA server. The ΑΑΑ sever 7 , the MS returns to WLAN and executes EAP-AKA. The ΑΑΑ server, which has stored AVs for the MS, conveys the AV with SQN AV = 14 to the MS.…”
Section: False Synchronizations In 3g-wlan Integrated Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…The AAA server performs ADR, since it does not possesses any AV for the involved MS. As a result, AuC generates a batch of 4 AVs with SQN AV = 13, 14, 15, 16 respectively, sets SQN HN = 16, and coveys them to the AAA server. The ΑΑΑ sever 7 , the MS returns to WLAN and executes EAP-AKA. The ΑΑΑ server, which has stored AVs for the MS, conveys the AV with SQN AV = 14 to the MS.…”
Section: False Synchronizations In 3g-wlan Integrated Networkmentioning
confidence: 99%
“…Apart from false synchronizations, recently a set of problems have been solved analytically, (such as [5], [6], [7], [8]) in order to improve various aspects of the authentication procedure in mobile networks. In all these problems, an analytical model is derived, which is used to draw guidelines on the selection of the appropriate value of various system parameters.…”
Section: Introductionmentioning
confidence: 99%
“…In general, with either a web-based or a SIM-based AAA procedure, the number of message exchanges will count to 14 to 17, which involve AP point, RADIUS client and server at the visited network and at the home networks. Further investigations show that the procedure impacts performance by introducing delays ranging from 2 to 7 seconds depending on roaming scenarios and network security configuration [1,21]. Efstathiou et al [11] propose organizing WLAN domains to a peer-to-peer wireless network for a ubiquitous Internet access in wider area coverage.…”
Section: Authentication and Privacy In Wlanmentioning
confidence: 99%
“…Liang and Wang [14] classify the intra-domain handoff authentication request events. The numerical analysis is taken into account just the event that when the UE starts the request within current MME domain and this request ends before the UE moves to another MME domain.…”
Section: B Bandwidth Overheadmentioning
confidence: 99%