2009
DOI: 10.1002/sec.114
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of IKEv2 authentication methods in next generation wireless networks

Abstract: Secure communications have a key role in future networks and applications. Information security provisions such as authorization, authentication, and encryption must be added to current communications protocols. To accomplish this, each protocol must be reexamined to determine the impact on performance of adding such security services. This paper presents an experimental evaluation of the performance costs of a wide variety of authentication methods over IKEv2 in real and partly emulated scenarios of next gene… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…However, with message sizes in the order of 10 KBytes and RTTs approaching 200 ms, the impact becomes quite significant. In fact, the figure predicts that some messages in a video flow (e.g., frames of size 30 KBytes that are transmitted at a frame rate of 30 frames/s) over a 3G wireless link with an RTT of 200 ms [25] experience delay penalties in the vicinity of 1 s.…”
Section: Predicting Startup Delays For Real-time Trafficmentioning
confidence: 98%
“…However, with message sizes in the order of 10 KBytes and RTTs approaching 200 ms, the impact becomes quite significant. In fact, the figure predicts that some messages in a video flow (e.g., frames of size 30 KBytes that are transmitted at a frame rate of 30 frames/s) over a 3G wireless link with an RTT of 200 ms [25] experience delay penalties in the vicinity of 1 s.…”
Section: Predicting Startup Delays For Real-time Trafficmentioning
confidence: 98%
“…At the hand of the optimization on IKEv2, Faigl et al [29] presented an experimental evaluation on the overhead of a wide variety of the authentication methods over IKEv2 in a practical and partly emulated scenario of the next generation wireless network. Cremers [8] used an adversary model to provide an extensive formal analysis of IKEv2 and found its several weaknesses.…”
Section: Related Workmentioning
confidence: 99%
“…IKE protocol is chosen as the target because it plays an important role in the network. For example, many researchers have been studying on security analysis , vulnerability detection , and performance evaluation of the IKE protocol. Furthermore, the statistical data extracted from the authoritative database National Vulnerability Database indicate that 82 IKE vulnerabilities have been released up to August 2011.…”
Section: Overviewmentioning
confidence: 99%
“…The vulnerabilities consist of 36 high‐risk vulnerabilities, 45 medium‐risk vulnerabilities, and one low‐risk vulnerability. Thus, many researchers have been studying on security analysis , vulnerability discovery , and performance evaluation of IKE protocol. This paper explores the prompt discovery of vulnerabilities so as to prevent damages efficiently.…”
Section: Introductionmentioning
confidence: 99%