Abstract
Recently, a set of problems have been solved analytically, in order to improve various aspects of the authentication procedure in mobile networks. In these problems, an analytical model is derived, which is used to draw guidelines on the selection of the appropriate value of various system parameters. We observe that all these problems can be solved using a generic modeling procedure that is based on Markov chains assuming exponential distributions. In this paper we apply this generic modeling procedure to the problem of false synchronizations in 3G-WLAN integrated networks. To this end, we first elaborate on false synchronization using a numerical example that facilitates the better understanding of the presented notions. Then, an analytical model based on a four dimensional Markov chain is developed, using the generic modeling procedure, whose accuracy is verified through simulations.
Chapter PDF
Similar content being viewed by others
References
3GPP TS 33.102 (v11.0.0), 3G security; Security Architecture, Release 11 (2011)
3GPP TS 33.234 (v11.2.0), 3G security; WLAN interworking security, Release 11 (2011)
Arkko, J., Haverinen, H.: EAP-AKA Authentication, RFC 4187 (January 2006)
Ntantogian, C., Xenakis, C., Stavrakakis, I.: Reducing False Synchronizations in 3G-WLAN Integrated Networks. IEEE Transactions on Wireless Communications 10(11), 3765–3773 (2011)
Lin, Y.-B., Chen, Y.-K.: Reducing Authentication Signalling Traffic in Third-Generation Mobile Network. IEEE Transactions on Wireless Communications 2(3), 493–501 (2003)
Zhang, Y., Fujise, M.: An Improvement for Authentication Protocol in Third Generation Wireless Networks. IEEE Transactions on Wireless Communications 5(9), 2348–2352 (2006)
Liang, W., Wang, W.: On Performance Analysis of Challenge/Response Based Authentication in Wireless Networks. Computer Networks 48(2), 267–288 (2005)
Lin, P., Cheng, S.-M., Liao, W.: Modeling Key Caching for Mobile IP Authentication, Authorization, and Accounting (AAA) Services. IEEE Transactions on Vehicular Technology 58(7), 3596–3608 (2009)
Alexiou, N., Deshpande, T., Basagiannis, S., Smolka, S., Katsaros, P.: Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking. In: IEEE 12th International Symposium on High-Assurance Systems Engineering (HASE), San Jose, CA (November 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Ntantogian, C., Xenakis, C., Stavrakakis, I. (2012). Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds) Information Security and Privacy Research. SEC 2012. IFIP Advances in Information and Communication Technology, vol 376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30436-1_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-30436-1_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30435-4
Online ISBN: 978-3-642-30436-1
eBook Packages: Computer ScienceComputer Science (R0)