{"title":"一种基于EAP-AKA的异构接入网络最优互通认证方案","authors":"Mei Song, Li Wang, Jianwen Huang, Junde Song","doi":"10.1109/CCECE.2009.5090237","DOIUrl":null,"url":null,"abstract":"Based on EAP-AKA for different wireless access networks, this paper mainly focuses on the optimal authentication scheme. First, an optimized interworking authentication architecture is proposed among 3GPP, WLAN and WiMAX. Additionally, we present an authentication analytic model for 3GPP-WiMAX, pointing out that the authentication signaling cost can not only be affected by the k value of the authentication vectors array at a time obtained by 3GPP AAA server from Home Subscriber Server (i.e. authentication center), but also be impacted by the times of re-authentication with the same AV. Finally, from the numerical simulations, it is desirable to provide guidelines for selecting an appropriate k, so as to achieve the best system performance.","PeriodicalId":153464,"journal":{"name":"2009 Canadian Conference on Electrical and Computer Engineering","volume":"365 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"An optimal interworking authentication scheme based on EAP-AKA for heterogeneous access networks\",\"authors\":\"Mei Song, Li Wang, Jianwen Huang, Junde Song\",\"doi\":\"10.1109/CCECE.2009.5090237\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Based on EAP-AKA for different wireless access networks, this paper mainly focuses on the optimal authentication scheme. First, an optimized interworking authentication architecture is proposed among 3GPP, WLAN and WiMAX. Additionally, we present an authentication analytic model for 3GPP-WiMAX, pointing out that the authentication signaling cost can not only be affected by the k value of the authentication vectors array at a time obtained by 3GPP AAA server from Home Subscriber Server (i.e. authentication center), but also be impacted by the times of re-authentication with the same AV. Finally, from the numerical simulations, it is desirable to provide guidelines for selecting an appropriate k, so as to achieve the best system performance.\",\"PeriodicalId\":153464,\"journal\":{\"name\":\"2009 Canadian Conference on Electrical and Computer Engineering\",\"volume\":\"365 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-05-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Canadian Conference on Electrical and Computer Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCECE.2009.5090237\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Canadian Conference on Electrical and Computer Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCECE.2009.5090237","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An optimal interworking authentication scheme based on EAP-AKA for heterogeneous access networks
Based on EAP-AKA for different wireless access networks, this paper mainly focuses on the optimal authentication scheme. First, an optimized interworking authentication architecture is proposed among 3GPP, WLAN and WiMAX. Additionally, we present an authentication analytic model for 3GPP-WiMAX, pointing out that the authentication signaling cost can not only be affected by the k value of the authentication vectors array at a time obtained by 3GPP AAA server from Home Subscriber Server (i.e. authentication center), but also be impacted by the times of re-authentication with the same AV. Finally, from the numerical simulations, it is desirable to provide guidelines for selecting an appropriate k, so as to achieve the best system performance.