Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

A quantitative study of authentication and QoS in wireless IP networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Liang, W. ; Dept. of Electr. & Comput. Eng., North Carolina State Univ., Raleigh, NC, USA ; Wenye Wang

With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relationship between the security and quality of service (QoS). In wireless networks, authentication can provide secure communications by preventing unauthorized usage and negotiating the credentials for data transmission. Nevertheless, it induces heavy overhead to data transmission, further deteriorating overall system performance. Thus, we analyze the impact of authentication on the security and QoS quantitatively in this paper. First, we introduce a system model based on a challenge/response authentication, which is widely used in many mobile environments. Then, a concept of security level is proposed to describe the protection of communications according to the nature of security, i.e., information secrecy, data integrity, and resource availability. By taking traffic and mobility patterns into account, our approach establishes a direct and quantitative connection between the security and QoS through the authentication. Finally, numerical results are provided to demonstrate the impact of security levels, mobility and traffic patterns on overall system performance in terms of authentication delay and call dropping probability.

Published in:

INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE  (Volume:2 )

Date of Conference:

13-17 March 2005