ABSTRACT
Contents 18.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550 18.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551 18.3 Authentication in Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
18.3.1 Secret Key-Based and Public Key-Based Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
18.3.2 Authentication Protocols in Wireless Networks. . . . . . . . . . 555 18.4 Effects of Authentication on Security and QoS . . . . . . . . . . . . . . . . . . . 556
18.4.1 Overview of Challenge-Response Authentication . . . . . . . 556 18.4.1.1 Intra-Domain Handoff Authentication . . . . . . . . . 557 18.4.1.2 Session Authentication . . . . . . . . . . . . . . . . . . . . . . . . . 557 18.4.1.3 Inter-Domain Handoff Authentication . . . . . . . . . 559
18.4.2 Effects of Authentication on Security and QoS Metrics . . 559 18.5 Analytical Model and Performance Evaluation . . . . . . . . . . . . . . . . . . . 560
18.5.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561 18.5.1.1 Scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561 18.5.1.2 Mobility Pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561 18.5.1.3 Traffic Pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
18.5.2 Performance Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562 18.5.2.1 Security Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563 18.5.2.2 Average Authentication Cost . . . . . . . . . . . . . . . . . . . 563 18.5.2.3 Average Authentication Delay . . . . . . . . . . . . . . . . . 564
18.5.3 Numerical Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565 18.5.3.1 Assumptions and Parameters . . . . . . . . . . . . . . . . . . 565 18.5.3.2 Effects of Mobility Pattern at Different
Security Levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567 18.5.3.3 Effect of Traffic Load at Different
Security Levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567 18.6 Experimental Studies on Authentication Mechanisms
in WLANs with IP Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570 18.6.1 Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572 18.6.2 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
18.6.2.1 Authentication Time. . . . . . . . . . . . . . . . . . . . . . . . . . . . 574 18.6.2.2 Authentication Cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
18.7 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
18.1 Overview The emergence of public access wireless networks enables ubiquitous Internet services, whereas inducing more challenges on security concerns due to a shared transmission medium. As one of the most widely used security mechanisms, authentication is used to provide secure communications by preventing unauthorized usage and negotiating credentials for verification. However, authentication protocols can cause large signaling overhead and end-to-end delay of communications, further deteriorating overall system performance. Therefore, we study the effects of authentication on quality-of-service (QoS) of roaming mobile users with Internet protocol (IP) mobility because, ultimately, the goal of using security protocols is to provide users with reliable services. In this chapter we first provide an introduction to authentication mechanisms in mobile wireless networks. Then we describe a simple classification of security levels based on security functions, that is, information secrecy, data integrity, and resource availability. More importantly, we focus on the network security protocols that are applicable to wireless local area networks (WLANs) because WLANs are currently being used widely for wireless access to the Internet. After that, we present an analytical model to evaluate the effects of authentications on QoS in different mobile environments. Finally, we provide real-time measurements of authentication delays and overhead through an experimental study to manifest the significant effects of authentication protocols in wireless networks.