{"title":"保护移动IPv6信令时IKEv2性能分析","authors":"Z. Faigl, S. Lindskog, A. Brunström","doi":"10.1109/ISWCS.2007.4392368","DOIUrl":null,"url":null,"abstract":"This paper describes an analysis of the performance overheads caused by the processing and space requirements of the IKEv2 protocol using Diameter and EAP-TLS authentication when protecting Mobile IPv6 signaling. IKEv2 negotiation between mobile nodes, the home agent, and the AAA server in a large-scale reference scenario is considered. The analysis is based on queuing theory and focuses on the overall utilization of the home agent and the AAA server by the IKEv2 reauthentication processes as well as the total mean response time for such a process in the network.","PeriodicalId":261480,"journal":{"name":"2007 4th International Symposium on Wireless Communication Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Analyzing IKEv2 Performance when Protecting Mobile IPv6 Signaling\",\"authors\":\"Z. Faigl, S. Lindskog, A. Brunström\",\"doi\":\"10.1109/ISWCS.2007.4392368\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes an analysis of the performance overheads caused by the processing and space requirements of the IKEv2 protocol using Diameter and EAP-TLS authentication when protecting Mobile IPv6 signaling. IKEv2 negotiation between mobile nodes, the home agent, and the AAA server in a large-scale reference scenario is considered. The analysis is based on queuing theory and focuses on the overall utilization of the home agent and the AAA server by the IKEv2 reauthentication processes as well as the total mean response time for such a process in the network.\",\"PeriodicalId\":261480,\"journal\":{\"name\":\"2007 4th International Symposium on Wireless Communication Systems\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 4th International Symposium on Wireless Communication Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISWCS.2007.4392368\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 4th International Symposium on Wireless Communication Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISWCS.2007.4392368","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analyzing IKEv2 Performance when Protecting Mobile IPv6 Signaling
This paper describes an analysis of the performance overheads caused by the processing and space requirements of the IKEv2 protocol using Diameter and EAP-TLS authentication when protecting Mobile IPv6 signaling. IKEv2 negotiation between mobile nodes, the home agent, and the AAA server in a large-scale reference scenario is considered. The analysis is based on queuing theory and focuses on the overall utilization of the home agent and the AAA server by the IKEv2 reauthentication processes as well as the total mean response time for such a process in the network.