首页> 外文期刊>Security and communication networks >Performance evaluation of IKEv2 authentication methods in next generation wireless networks
【24h】

Performance evaluation of IKEv2 authentication methods in next generation wireless networks

机译:下一代无线网络中IKEv2身份验证方法的性能评估

获取原文
获取原文并翻译 | 示例
           

摘要

Secure communications have a key role in future networks and applications. Information security provisions such as authorization, authentication, and encryption must be added to current communications protocols. To accomplish this, each protocol must be reexamined to determine the impact on performance of adding such security services. This paper presents an experimental evaluation of the performance costs of a wide variety of authentication methods over IKEv2 in real and partly emulated scenarios of next generation wireless networks. The studied methods are pre-shared keys (PSKs), extensible authentication protocol (EAP) using MD5, SIM, TTLS-MD5, TLS, and PEAP-MSCHAPv2. For the EAP-based methods, RADIUS is used as the authentication, authorization, and accounting (AAA) server. Different lengths of certificate chains are studied in case of the TLS-based methods, i.e., TTLS-MD5, TLS, and PEAP-MSCHAPv2. The paper first presents a brief overview of the considered authentication methods. Then, a comparison of the costs for message transfers and computations associated with the authentication methods is provided. The measurement results are verified through a simple analysis, and interpreted by discussing the main contributing factors of the costs. The measurement results illustrate the practical costs involved for IKEv2 authentication, and the implications of the use of different methods are discussed. Copyright © 2009 John Wiley & Sons, Ltd.
机译:安全通信在未来的网络和应用中将发挥关键作用。诸如授权,身份验证和加密之类的信息安全条款必须添加到当前的通信协议中。为此,必须重新检查每个协议,以确定对添加此类安全服务的性能的影响。本文介绍了在下一代无线网络的真实和部分仿真场景中,各种认证方法在IKEv2上的性能成本的实验评估。研究的方法是预共享密钥(PSK),使用MD5,SIM,TTLS-MD5,TLS和PEAP-MSCHAPv2的可扩展身份验证协议(EAP)。对于基于EAP的方法,RADIUS用作身份验证,授权和计费(AAA)服务器。对于基于TLS的方法,即TTLS-MD5,TLS和PEAP-MSCHAPv2,研究了证书链的不同长度。本文首先简要介绍了所考虑的身份验证方法。然后,提供了与认证方法相关的消息传输和计算成本的比较。通过简单的分析验证测量结果,并通过讨论成本的主要影响因素对其进行解释。测量结果说明了IKEv2身份验证涉及的实际成本,并讨论了使用不同方法的含义。版权所有©2009 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号