Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Analysis of Modified EAP-AKA Protocol Based on EAP-TLS for Beyond 3G Wireless Networks

R. Narmadha, Dr.S. Malarkkan

Abstract


For future heterogeneous system the security is the one of the most important problem. Interworking of Universal Mobile Telecommunication Systems (UMTS) and wireless local area networks (WLANs) establishes new challenges in the design of secured protocol. Our approach focuses on Public Key Infrastructure (PKI) to be integrated in beyond 3G network. The Extensible Authentication Protocol –Transport layer security (EAP-TLS) protocol is a standard framework supporting multiple types of authentication methods and it provides a certificate based mutual authentication. This paper analyzed the modification of Extensible Authentication Protocol-Authentication key agreement (EAP_AKA) mechanism based on EAP-TLS. In addition the performance of this modified protocol is analyzed with authentication cost under different mobility and traffic pattern.

Keywords


UMTS-WLAN, EAP-TLS, EAP-AKA

Full Text:

PDF

References


GeorgiosKambourakis,Angelos Rouskas,Stefanos Gritzalis, “Performance Evaluation of Public Key-Based Authentication in Future Mobile Communication Systems,” EURASIP Journal on Wireless Communications and Networking 2004:, 184–197, Hindawi Publishing Corporation

Ali Al Shidhani and Victor C. M. Leung., “Reducing Re-authentication Delays During UMTS-WLAN Vertical Handovers,”978-1-4244-2644-7/08/ 2008.

J.Arkko and H. Haverinen, “Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)”, IETF RFC 4187, Jan. 2006.

Hong Chen , Miroslav Živković, Dirk-Jaap Plas., “ Transparent End-User Authentication Across Heterogeneous Wireless Networks”.,0-7803-7954-3/03,2003

3GPP System Architecture Evolution (SAE); Security Architecture, 3GPP TS 33.401 V8.2.1 (2008-12)

Kambourakis G., Rouskas A., & Gritzalis S., “Using SSL in Authentication and Key Agreement Procedures of Future Mobile Networks,” In the Proc. of the 4th IEEE Int‟l Conf. On Mobile and Wireless Comm. Networks (MWCN 2002), pp. 152-156, Sep. 2002.

Dixit, S. & Prasad, R.(Editors), “Wireless IP and Building the Mobile Internet, ” Artech House,2003.

Bhawna gupta,seema mehla., “Analyzing EAP-TLS &ERP protocol with varying processor speed,”International journal of computer applications(0975-8887),volume7-No.13,October 2010.

Duane, N. & Brink, J., “ PKI Implementing and Managing E-Security,”Berkeley, RSA press, 2001.

http://www.esat.kuleuven.ac.be/cosic/aspect, 1999.

Geir M. Koien and Thomas Haslestad, “Security Aspects of 3G-WLAN Interworking,”IEEE Communications Magazine, November 2003. pp.82-88.

IETF, RFC 2716, PPP EAP TLS Authentication Protocol (Oct.1999).

Internet-Draft, EAP Tunneled TLS Authentication Protocol, draft-ietfpppext-eap-ttls-03.txt, work in progress.

H-H. Choi, O. Song and D-H. Cho, “Seamless Handoff Scheme Based on Pre-registration and Pre-authentication for UMTS-WLAN Interworking”, International Journal of Wireless Personal Communications, vol. 41, issue 3, pp. 345-364, 2006.

Al Shidhani and V. Leung, “Local Fast Re-authentication protocol for 3G-WLAN interworking architecture”, In Proc of Wireless Telecommunications Symposium 2007, WTS‟2007, USA, Apr. 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.