CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Performance Analysis of Signaling Cost on Eap-Tls Authentication Protocol Based on Cryptography

by R.Narmadha, Dr.S.Malarkan, Dr.C.Ramesh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 33 - Number 7
Year of Publication: 2011
Authors: R.Narmadha, Dr.S.Malarkan, Dr.C.Ramesh
10.5120/4032-5771

R.Narmadha, Dr.S.Malarkan, Dr.C.Ramesh . Performance Analysis of Signaling Cost on Eap-Tls Authentication Protocol Based on Cryptography. International Journal of Computer Applications. 33, 7 ( November 2011), 18-23. DOI=10.5120/4032-5771

@article{ 10.5120/4032-5771,
author = { R.Narmadha, Dr.S.Malarkan, Dr.C.Ramesh },
title = { Performance Analysis of Signaling Cost on Eap-Tls Authentication Protocol Based on Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { November 2011 },
volume = { 33 },
number = { 7 },
month = { November },
year = { 2011 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume33/number7/4032-5771/ },
doi = { 10.5120/4032-5771 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:19:33.222066+05:30
%A R.Narmadha
%A Dr.S.Malarkan
%A Dr.C.Ramesh
%T Performance Analysis of Signaling Cost on Eap-Tls Authentication Protocol Based on Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 33
%N 7
%P 18-23
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the wide applications of wireless communication in the air inter-face, needs secure connections, efficient decryption and strong authentication mechanisms. In general,authentication procedure adds extra messages to the original message flow and results in throughput reduction/ increase in processing time. Reducing the processing time spent on authentication procedure is very important for a smooth and seamless hand over. However there is a cost ,while deploying security on a network in terms of processing time. Extensible Authentication Protocol –Transport Layer Security (EAP-TLS) is a robust authentication mechanism used in beyond 3G (B3G) environments and it is seconded by Public Key Infrastructure (PKI).EAP-TLS authentication protocol supports a large number of cipher suites. By using Advanced Encryption Algorithm (AES) and Diffie Hellman -RSA key exchanges, a secure communication were established in B3G networks. This paper formally analyzes EAP-TLS message flow with cryptography algorithms and also numerical results are evaluated with the signaling cost. In addition to that PKI based solution has been discussed against Extensible Authentication Protocol –Authentication key Algorithm (EAP-AKA) procedures. The proof result shows that the authentication process of EAP-TLS can guarantee the security of wireless communication

References
  1. Ali Al Shidhani and Victor C. M. Leung, “Reducing Re-authentication Delays during UMTS-WLAN Vertical Handovers”1907
  2. /2005, Bell Canada and the Natural Sciences and Engineering Research Council of Canada under grant CRDPJ 328202-05, 2008.
  3. G. Kambourakis, A. Rouskas and S. Gritzalis, “Advanced SSL/TLSbased authentication for secure WLAN-3G Interworking”, IEEE Communications Proceedings, vol. 151, issue. 5, pp. 501-506, 2004.
  4. IETF Internet Draft, ‘EAP tunneled TLS authentication protocol’ April 2004, 16 IETF Internet Draft, May 2005.
  5. M. Kassar,M. Kassar, B. Kervella and G. Pujolle, “An overview of vertical handover decision strategies in heterogeneous wireless networks” Journal on Elsevier Computer Communications, Volume 31, Issue 10, 25,pp. 2607-2620, June 2008.
  6. Mark Manulis, Damien Leroy, Francois Koeune, Olivier Bonaventure., "Authenticated wireless roaming via tunnels: making mobile guests feel at home” ASIACCS '09 Proceedings of the 4th International Symposium on Information Computer, and Communications Security , ACM New York, NY, USA ,2009 .
  7. Shen-Ho Lin and Jung-Hui Chiu, Sung-Shiou Shen, “Performance valuation of the Fast Authentication Schemes in GSM-WLAN Heterogeneous Networks”, Journal of networks, vol. 5, no. 8, August 2010
  8. R. Narmadha, .S. Malarkkan, “Performance Analysis of Modified EAP-AKA Protocol Based on EAP-TLS for Beyond 3G Wireless Networks”, CiiT International Journal of Networking and Communication Engineering, Print: ISSN 0974 – 9713 & Online: ISSN 0974 – 9616, Jan 2011.
  9. Y.B. Lin, Y.K. Chen, “Reducing Authentication Signaling Traffic in Third-Generation Mobile Network”, IEEE Transactions on Wireless Communications, Vol.2, No. 3, pp 493-501, May 2003.
  10. P.Bachan, Brahmjit Singh,” Performance Evaluation of Authentication Protocols for IEEE 802.11 Standard”,ICCCT 10,978-1-4244-9034-/10,2010 .
  11. Ali Al Shidhani and Victor C. M. Leung, “Pre-Authentication Schemes for UMTS-WLAN Interworking”, EURASIP Journal on Wireless Communications and Networking Volume 2009 , Article ID 806563, 16 pages doi:10.1155/2009/806563.
  12. Georgios Kambourakis, Angelos Rouskas, and Dimitris GritzalisS, “ Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks”,.K. Katsikas et al. (Eds.): EuroPKI 2004, LNCS 3093, pp. 287-296, Springer-Verlag Berlin Heidelberg 2004.
  13. P. Prasithsangaree and P. Krishnamurthy, “A new authentication mechanism for loosely coupled 3G-WLAN integrated networks,” in Proceedings of the 59th IEEE Vehicular Technology Conference (VTC '04), vol. 5, pp. 2998–3003, Milan, Italy, May 2004.
  14. D. Simon, B Aboba, R. Hurst, The EAP-TLS Authentication Protocol, RFC 5216 (Proposed Standard), March 2008.
  15. Chou-Chen Yang, Kuan-Hao Chu, and Ya-Wen Yang, “3G and WLAN Interworking Security: Current Status and Key Issues” International Journal of Network Security, Vol.2, No.1, PP.1–13, Jan. 2006
  16. Yuh-Min Tseng, “USIM-based EAP-TLS authentication protocol for wireless local area networks”, Computer Standards & Interfaces, Vol 31, Issue 1, Jan 2009.
  17. C. Ntantogian, C. Xenakis, and I. Stavrakakis, “Efficient authentication for users autonomy in next generation all-ip networks,” pp. 295 –300, 2007.
  18. Y.-B. Lin, M.-F. Chang, M.-T. Hsu, and L.-Y. Wu, “One-pass GPRS and IMS authentication procedure for UMTS.” IEEE Journal on Selected Areas in Communications May 2010.
  19. JongMin Jeong, GooYeon Lee and SangJae Moon, “Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks” Computer And Information Sciences – Iscis , Volume 4263/2006, 413-423, DOI: 10.1007/11902140 45, 2006.
  20. Xinghua Li, Jianfeng Ma, YoungHo Park, and Li Xu“A USIM-Based Uniform Access Authentication Framework in Mobile Communication”, EURASIP Journal on Wireless CommunicationsandNetworking,ArticleID 867315,12pages doi:10.1155/2011/867315, 2011 .
  21. T. Clancy, draft-ietf-hokey-reauth-ps-02, "Handover Key Management and Re-authentication Problem Statement", July 2007.
  22. Bernard Aboba, Dan Simon, "Extensible Authentication Protocol(EAP) Key Management Framework", IETF draft-ietfeap-keying-, November 2007.
  23. Third Generation Partnership Project , “3GPP system to Wireles Local Area Network (WLAN) interworking T; System description,TS 23.234,V6.0.0 ,” 3GPP2 technical specifications,Apr 2004.
  24. Chou-Chen Yang, Kuan-Hao Chu2, and Ya-Wen Yang, 3G and WLAN Interworking Security: Current Status and Key Issues, International Journal of Network Security, Vol.2, No.1, PP.1–13, Jan. 2006.
  25. T.Dierks and E.Rescorla. The Transport Layer Security (TLS) Protocol version 1.2. RFC 5246(proposed standard), August 2008. Updated by RFCs 5746, 5878
Index Terms

Computer Science
Information Sciences

Keywords

EAP-TLS EAP-AKA AES Authentication cost