Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Performance Analysis of Signaling Cost on Eap-Tls Authentication Protocol Based on Cryptography

Print
PDF
International Journal of Computer Applications
© 2011 by IJCA Journal
Volume 33 - Number 7
Year of Publication: 2011
Authors:
R.Narmadha
Dr.S.Malarkan
Dr.C.Ramesh
10.5120/4032-5771

R.Narmadha, Dr.S.Malarkan and Dr.C.Ramesh. Article: Performance Analysis of Signaling Cost on Eap-Tls Authentication Protocol Based on Cryptography. International Journal of Computer Applications 33(7):18-23, November 2011. Full text available. BibTeX

@article{key:article,
	author = {R.Narmadha and Dr.S.Malarkan and Dr.C.Ramesh},
	title = {Article: Performance Analysis of Signaling Cost on Eap-Tls Authentication Protocol Based on Cryptography},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {33},
	number = {7},
	pages = {18-23},
	month = {November},
	note = {Full text available}
}

Abstract

With the wide applications of wireless communication in the air inter-face, needs secure connections, efficient decryption and strong authentication mechanisms. In general,authentication procedure adds extra messages to the original message flow and results in throughput reduction/ increase in processing time. Reducing the processing time spent on authentication procedure is very important for a smooth and seamless hand over. However there is a cost ,while deploying security on a network in terms of processing time. Extensible Authentication Protocol –Transport Layer Security (EAP-TLS) is a robust authentication mechanism used in beyond 3G (B3G) environments and it is seconded by Public Key Infrastructure (PKI).EAP-TLS authentication protocol supports a large number of cipher suites. By using Advanced Encryption Algorithm (AES) and Diffie Hellman -RSA key exchanges, a secure communication were established in B3G networks. This paper formally analyzes EAP-TLS message flow with cryptography algorithms and also numerical results are evaluated with the signaling cost. In addition to that PKI based solution has been discussed against Extensible Authentication Protocol –Authentication key Algorithm (EAP-AKA) procedures. The proof result shows that the authentication process of EAP-TLS can guarantee the security of wireless communication

Reference

  • Ali Al Shidhani and Victor C. M. Leung, “Reducing Re-authentication Delays during UMTS-WLAN Vertical Handovers”1907
  • /2005, Bell Canada and the Natural Sciences and Engineering Research Council of Canada under grant CRDPJ 328202-05, 2008.
  • G. Kambourakis, A. Rouskas and S. Gritzalis, “Advanced SSL/TLSbased authentication for secure WLAN-3G Interworking”, IEEE Communications Proceedings, vol. 151, issue. 5, pp. 501-506, 2004.
  • IETF Internet Draft, ‘EAP tunneled TLS authentication protocol’ April 2004, 16 IETF Internet Draft, May 2005.
  • M. Kassar,M. Kassar, B. Kervella and G. Pujolle, “An overview of vertical handover decision strategies in heterogeneous wireless networks” Journal on Elsevier Computer Communications, Volume 31, Issue 10, 25,pp. 2607-2620, June 2008.
  • Mark Manulis, Damien Leroy, Francois Koeune, Olivier Bonaventure., "Authenticated wireless roaming via tunnels: making mobile guests feel at home” ASIACCS '09 Proceedings of the 4th International Symposium on Information Computer, and Communications Security , ACM New York, NY, USA ,2009 .
  • Shen-Ho Lin and Jung-Hui Chiu, Sung-Shiou Shen, “Performance valuation of the Fast Authentication Schemes in GSM-WLAN Heterogeneous Networks”, Journal of networks, vol. 5, no. 8, August 2010
  • R. Narmadha, .S. Malarkkan, “Performance Analysis of Modified EAP-AKA Protocol Based on EAP-TLS for Beyond 3G Wireless Networks”, CiiT International Journal of Networking and Communication Engineering, Print: ISSN 0974 – 9713 & Online: ISSN 0974 – 9616, Jan 2011.
  • Y.B. Lin, Y.K. Chen, “Reducing Authentication Signaling Traffic in Third-Generation Mobile Network”, IEEE Transactions on Wireless Communications, Vol.2, No. 3, pp 493-501, May 2003.
  • P.Bachan, Brahmjit Singh,” Performance Evaluation of Authentication Protocols for IEEE 802.11 Standard”,ICCCT 10,978-1-4244-9034-/10,2010 .
  • Ali Al Shidhani and Victor C. M. Leung, “Pre-Authentication Schemes for UMTS-WLAN Interworking”, EURASIP Journal on Wireless Communications and Networking Volume 2009 , Article ID 806563, 16 pages doi:10.1155/2009/806563.
  • Georgios Kambourakis, Angelos Rouskas, and Dimitris GritzalisS, “ Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks”,.K. Katsikas et al. (Eds.): EuroPKI 2004, LNCS 3093, pp. 287-296, Springer-Verlag Berlin Heidelberg 2004.
  • P. Prasithsangaree and P. Krishnamurthy, “A new authentication mechanism for loosely coupled 3G-WLAN integrated networks,” in Proceedings of the 59th IEEE Vehicular Technology Conference (VTC '04), vol. 5, pp. 2998–3003, Milan, Italy, May 2004.
  • D. Simon, B Aboba, R. Hurst, The EAP-TLS Authentication Protocol, RFC 5216 (Proposed Standard), March 2008.
  • Chou-Chen Yang, Kuan-Hao Chu, and Ya-Wen Yang, “3G and WLAN Interworking Security: Current Status and Key Issues” International Journal of Network Security, Vol.2, No.1, PP.1–13, Jan. 2006
  • Yuh-Min Tseng, “USIM-based EAP-TLS authentication protocol for wireless local area networks”, Computer Standards & Interfaces, Vol 31, Issue 1, Jan 2009.
  • C. Ntantogian, C. Xenakis, and I. Stavrakakis, “Efficient authentication for users autonomy in next generation all-ip networks,” pp. 295 –300, 2007.
  • Y.-B. Lin, M.-F. Chang, M.-T. Hsu, and L.-Y. Wu, “One-pass GPRS and IMS authentication procedure for UMTS.” IEEE Journal on Selected Areas in Communications May 2010.
  • JongMin Jeong, GooYeon Lee and SangJae Moon, “Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks” Computer And Information Sciences – Iscis , Volume 4263/2006, 413-423, DOI: 10.1007/11902140 45, 2006.
  • Xinghua Li, Jianfeng Ma, YoungHo Park, and Li Xu“A USIM-Based Uniform Access Authentication Framework in Mobile Communication”, EURASIP Journal on Wireless CommunicationsandNetworking,ArticleID 867315,12pages doi:10.1155/2011/867315, 2011 .
  • T. Clancy, draft-ietf-hokey-reauth-ps-02, "Handover Key Management and Re-authentication Problem Statement", July 2007.
  • Bernard Aboba, Dan Simon, "Extensible Authentication Protocol(EAP) Key Management Framework", IETF draft-ietfeap-keying-, November 2007.
  • Third Generation Partnership Project , “3GPP system to Wireles Local Area Network (WLAN) interworking T; System description,TS 23.234,V6.0.0 ,” 3GPP2 technical specifications,Apr 2004.
  • Chou-Chen Yang, Kuan-Hao Chu2, and Ya-Wen Yang, 3G and WLAN Interworking Security: Current Status and Key Issues, International Journal of Network Security, Vol.2, No.1, PP.1–13, Jan. 2006.
  • T.Dierks and E.Rescorla. The Transport Layer Security (TLS) Protocol version 1.2. RFC 5246(proposed standard), August 2008. Updated by RFCs 5746, 5878