Abstract
With the wide application of mobile technology in wireless transmission, the interworking of various networks turns into a new trend. UMTS-WiMAX interworking is being widely considered by mobile service providers because of its advantages for both users and service providers.Generally authentication methods are different for various wireless networks. In this paper, cost analysis are to realize efficient authentication in wireless networks based on the user mobility ,encryption and transmission time. This paper analyses a strong password based EAP-TLS authentication protocol which uses PKI for mutual authentication and satisfy the entire requirement for UMTS-WiMAX interworking authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Munasinghe, K.S., Jamalipour, A.: Interworked WiMAX-3G Cellular Data Networks: An Architecture for Mobility Management and Performance Evaluation. IEEE Transactions on Wireless Communications 8(4) (April 2009)
Khan, M.M.A., Ismail, M.F.B., Dimyati, K.: Interworking between WiMAX and UMTS to provide seamless services. International Journal of the Physical Sciences 5(6), 852–864 (2010)
Lin, M., Choi, H., la Porta, T.: CDMA2000-WiMAX Interworking. Sprint Avanced Technology lab
Nakhjiri, M., Nakhjiri, M.: AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility. John Wiley and Sons (October 2005)
WiMAX End-to-End Network Systems Architecture - 3GPP/ WiMAX Interworking, Release 1. WiMAX Forum (2006)
Liang, W., Wang, W.: On performance analysis of challenge/response based authentication in wireless networks. Computer Network 48(2), 267–288 (2005)
Cagalj, M., Capkun, S., Hubaux, J.: Key agreement in peer-to-peer wireless networks. Proceedings of the IEEE, Special Issue on Securityand Cryptography 94(2), 467–478 (2006)
Hess, A., Schafer, G.: Performance evaluation of AAA/ mobile IP authentication. In: Proc. of 2nd Polish-German Teletraffic Symposium (September 2002)
Li, J., Jing, H., Wang, G., Yang, K.: Authentication Protocols for Mobile IP Networks. In: Innovative Computing Information and Control, ICICIC 2008, Grad. Sch. of Syst. & Inf. Eng., Univ. of Tsukuba, Tsukuba (2008)
Li, J., Li, R., Kato, J.: Future Trust Management Framework for Mobile Ad Hoc Networks. IEEE Communication Magazine 46(4), 108–114 (2008)
Jing, H., Li, J., Yang, K., Chen, H.: A Novel Commitment-based Authentication Protocol Based on AAA Architecture for Mobile IP Networks. In: Proceedings of IEEE Wireless Communications and Networking Conference 2007 (IEEE WCNC 2007), CD-ROM, Hong Kong, March 11-15, 5 pages (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Narmadha, R., Malarkan, S. (2012). Performance Evaluation of EAP-TLS Authentication Protocol for UMTS-WiMAX Interworking. In: Krishna, P.V., Babu, M.R., Ariwa, E. (eds) Global Trends in Computing and Communication Systems. ObCom 2011. Communications in Computer and Information Science, vol 269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29219-4_79
Download citation
DOI: https://doi.org/10.1007/978-3-642-29219-4_79
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29218-7
Online ISBN: 978-3-642-29219-4
eBook Packages: Computer ScienceComputer Science (R0)