Skip to main content
Erschienen in: Wireless Personal Communications 2/2023

05.03.2023

Authentication Analysis in HETNETS: Interworking Performance

verfasst von: R. Narmadha, U. Anitha

Erschienen in: Wireless Personal Communications | Ausgabe 2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In heterogeneous networks, mobile nodes face long authentication delays, affecting the throughput and the duration for the entire authentication process increases considerably. The ultimate reduction in the processing time on authentication procedure is required for a smooth and seamless hand over. Authentication delay occurs because of key exchange between administrative domains. It is noticeable that as the number of mobile nodes requesting authentication increases, the operating cost of the authentication process also increases which turns into a big key challenging problem. The interoperability of dissimilar next generation networks will lead to better data rates, good spectrum efficiency and excellent serviceability to mobile users. Several factors cause decline in the quality of service and increase in handover delay. The proposed research work aims at developing an efficient authentication technique that improves the security of data transmission in heterogeneous network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Shidhani, A. A., & Leung, V. C. M. (2008). Local fast re-authentication for 3G-WLAN interworking. Security and Communication Networks, 1(4), 309–323.CrossRef Shidhani, A. A., & Leung, V. C. M. (2008). Local fast re-authentication for 3G-WLAN interworking. Security and Communication Networks, 1(4), 309–323.CrossRef
3.
Zurück zum Zitat Huang, Y. H., & Chen, Y.-C. (2010). A cross-layer media-independent Handover scheme in heterogeneous WiMAX/WiFi networks. In Proceedings of the 8th International Network Conference, INC 2010 (pp. 121–130). Huang, Y. H., & Chen, Y.-C. (2010). A cross-layer media-independent Handover scheme in heterogeneous WiMAX/WiFi networks. In Proceedings of the 8th International Network Conference, INC 2010 (pp. 121–130).
4.
Zurück zum Zitat Huang, Y.-L., Shen, C. Y., Shieh, S., Wang, H.-J., & Lin, C.-C. (2009). Provable secure AKA scheme with reliable key delegation in UMTS. In Third IEEE international conference on secure software integration and reliability improvement (pp. 243–252). Huang, Y.-L., Shen, C. Y., Shieh, S., Wang, H.-J., & Lin, C.-C. (2009). Provable secure AKA scheme with reliable key delegation in UMTS. In Third IEEE international conference on secure software integration and reliability improvement (pp. 243–252).
5.
Zurück zum Zitat Pontes, A., Silva, D., Jailton, J., Rodrigues, O., & Dias, K. (2008). Handover management in integrated WLAN and mobile WiMAX networks. IEEE Wireless Communications, 15(5), 86–95.CrossRef Pontes, A., Silva, D., Jailton, J., Rodrigues, O., & Dias, K. (2008). Handover management in integrated WLAN and mobile WiMAX networks. IEEE Wireless Communications, 15(5), 86–95.CrossRef
6.
Zurück zum Zitat Cao, L., Liu, Y., & Cao, S. (2019). An authentication protocol in LTE-WLAN heterogeneous converged network based on certificateless sign crypton scheme with identity privacy protection. IEEE Access, 7, 139001–139012.CrossRef Cao, L., Liu, Y., & Cao, S. (2019). An authentication protocol in LTE-WLAN heterogeneous converged network based on certificateless sign crypton scheme with identity privacy protection. IEEE Access, 7, 139001–139012.CrossRef
8.
Zurück zum Zitat Wang, S., Cao, Z., & Cao, F. (2008). Efficient identity-based authenticated key agreement protocol with PKG forward secrecy. International Journal of Network Security, 7(2), 181–186. Wang, S., Cao, Z., & Cao, F. (2008). Efficient identity-based authenticated key agreement protocol with PKG forward secrecy. International Journal of Network Security, 7(2), 181–186.
9.
Zurück zum Zitat Arkko, J., & Haverinen, H. (2006). Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA). In IETF, RFC 4187. Arkko, J., & Haverinen, H. (2006). Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA). In IETF, RFC 4187.
10.
Zurück zum Zitat Rai, A. K., Mishra, S., & Kumar, V. (2010). Strong password based EAP-TLS authentication protocol for WiMAX. International Journal on Computer Science and Engineering, 2(8), 2736–2741. Rai, A. K., Mishra, S., & Kumar, V. (2010). Strong password based EAP-TLS authentication protocol for WiMAX. International Journal on Computer Science and Engineering, 2(8), 2736–2741.
11.
Zurück zum Zitat Lai, C., Li, H., Lu, R., & Shen, X. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57, 3492–3510.CrossRef Lai, C., Li, H., Lu, R., & Shen, X. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57, 3492–3510.CrossRef
12.
Zurück zum Zitat Choi, D., Choi, H.-K., & Lee, S.-Y. (2015). A group-based security protocol for machine-type communications in LTE- advanced. Wireless Networks, 21(2), 405–419.CrossRef Choi, D., Choi, H.-K., & Lee, S.-Y. (2015). A group-based security protocol for machine-type communications in LTE- advanced. Wireless Networks, 21(2), 405–419.CrossRef
14.
Zurück zum Zitat Mun, H., Han, K., & Kim, K. (2009). 3G-WLAN interworking: Security analysis and new authentication and key agreement based on EAP AKA. In Proceedings of WTS’09, Prague, Czech (pp. 1–8) Mun, H., Han, K., & Kim, K. (2009). 3G-WLAN interworking: Security analysis and new authentication and key agreement based on EAP AKA. In Proceedings of WTS’09, Prague, Czech (pp. 1–8)
15.
Zurück zum Zitat Potlapally, N. R., Ravi, S., Raghunathan, A., & Jha, N. K. (2006). A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing, 5(2), 128–143.CrossRef Potlapally, N. R., Ravi, S., Raghunathan, A., & Jha, N. K. (2006). A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing, 5(2), 128–143.CrossRef
17.
Zurück zum Zitat Urien, P., & Dandjinou, M. (2006). Designing smartcards for emerging wireless networks. In Series lecture notes in smart card research and advanced applications (Vol. 3928, pp. 165–178) Urien, P., & Dandjinou, M. (2006). Designing smartcards for emerging wireless networks. In Series lecture notes in smart card research and advanced applications (Vol. 3928, pp. 165–178)
18.
Zurück zum Zitat Hamada, R. A., Ali, H. S., & Abdalla, M. I. (2014). SIP-based mobility management for LTE-WiMAX-WLAN interworking using IMS architecture. International Journal of Computer Networks, 6(1), 1–14. Hamada, R. A., Ali, H. S., & Abdalla, M. I. (2014). SIP-based mobility management for LTE-WiMAX-WLAN interworking using IMS architecture. International Journal of Computer Networks, 6(1), 1–14.
19.
Zurück zum Zitat Lin, S.-H., Chiu, J.-H., & Shen, S.-S. (2011). A fast iterative localized re-authentication protocol for UMTS-WLAN heterogeneous mobile communication networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), 1.CrossRef Lin, S.-H., Chiu, J.-H., & Shen, S.-S. (2011). A fast iterative localized re-authentication protocol for UMTS-WLAN heterogeneous mobile communication networks. EURASIP Journal on Wireless Communications and Networking, 2011(1), 1.CrossRef
20.
Zurück zum Zitat Simon, D., Aboba, B., & Hurst, R. (2008). The EAP-TLS authentication protocol. In RFC 5216. Simon, D., Aboba, B., & Hurst, R. (2008). The EAP-TLS authentication protocol. In RFC 5216.
22.
Zurück zum Zitat Urien, P., Badra, M., & Dandjinou, M. (2004). EAP-TLS smartcards, from dream to reality. In 4th workshop on applications and services in wireless networks, ASWN, Boston University, Boston, August 8–11. Urien, P., Badra, M., & Dandjinou, M. (2004). EAP-TLS smartcards, from dream to reality. In 4th workshop on applications and services in wireless networks, ASWN, Boston University, Boston, August 8–11.
24.
Zurück zum Zitat Hajjaji El, Y., Idrissi, N. Z., & Jedra, M. (2014). A new authentication method for vertical and horizontal handover in 3G-WLAN interworking architecture. Research Journal of Applied Sciences, Engineering and Technology, 7(2), 329–342.CrossRef Hajjaji El, Y., Idrissi, N. Z., & Jedra, M. (2014). A new authentication method for vertical and horizontal handover in 3G-WLAN interworking architecture. Research Journal of Applied Sciences, Engineering and Technology, 7(2), 329–342.CrossRef
25.
Zurück zum Zitat Kwon, J. O., Jeong, I. R., Sakurai, K., & Lee, D. H. (2007). Efficient verifier-based password-authenticated key exchange in the three-party setting. Computer Standards & Interfaces, 29(5), 513–520.CrossRef Kwon, J. O., Jeong, I. R., Sakurai, K., & Lee, D. H. (2007). Efficient verifier-based password-authenticated key exchange in the three-party setting. Computer Standards & Interfaces, 29(5), 513–520.CrossRef
28.
Zurück zum Zitat You, I., & Lee, J.-H. (2017). SPFP-ticket-based secure handover for fast proxy mobile IPv6 in 5G networks. Computer Networks, 129, 363–372.CrossRef You, I., & Lee, J.-H. (2017). SPFP-ticket-based secure handover for fast proxy mobile IPv6 in 5G networks. Computer Networks, 129, 363–372.CrossRef
Metadaten
Titel
Authentication Analysis in HETNETS: Interworking Performance
verfasst von
R. Narmadha
U. Anitha
Publikationsdatum
05.03.2023
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2023
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-023-10186-w

Weitere Artikel der Ausgabe 2/2023

Wireless Personal Communications 2/2023 Zur Ausgabe