{"title":"An analytical study on the impact of authentication in wireless local area network","authors":"W. Liang, Wenye Wang","doi":"10.1109/ICCCN.2004.1401670","DOIUrl":null,"url":null,"abstract":"Authentication can provide security by preventing unauthorized usage and negotiating the credentials for secure communications. Nevertheless, it induces heavy overhead to communications, further deteriorating the quality of service (QoS). Therefore, analyzing the QoS and security impact of authentication becomes critical to developing efficient authentication schemes. In this paper, we first introduce a system model for the analysis of challenge/response authentication in wireless networks. Then, we evaluate authentication cost, delay, and call dropping probability for different security levels. By considering traffic and mobility patterns, we show the numerical results to illustrate the impact of authentication on security and system performance","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN.2004.1401670","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Authentication can provide security by preventing unauthorized usage and negotiating the credentials for secure communications. Nevertheless, it induces heavy overhead to communications, further deteriorating the quality of service (QoS). Therefore, analyzing the QoS and security impact of authentication becomes critical to developing efficient authentication schemes. In this paper, we first introduce a system model for the analysis of challenge/response authentication in wireless networks. Then, we evaluate authentication cost, delay, and call dropping probability for different security levels. By considering traffic and mobility patterns, we show the numerical results to illustrate the impact of authentication on security and system performance