asice
发贴: 0
|
于 2004-03-27 14:31
This article1 describes a simulation study of the performance of the current IETF approach to authenticating mobile nodes by means of an integrated Authentication, Authorization and Accounting (AAA) infrastructure. The main findings of the study are: 1) the delay experienced by a mobile node in case of a full authentication dialogue involving entities of the mobile node’s home network is largely determined by the end-to-end delay between the foreign and the home network, 2) the workload of AAA servers remains moderate in case of a load- and mobility model inspired by established values of GSM networks as well as in case of a more progressive mobility model [5], and 3) the workload of AAA servers grows infinitely under both mobility models if cryptographic algorithms are used that require about 100 (30) times the processing capabilities of algorithms currently envisaged by the IETF (cryptographic hash functions and symmetric encryption). An important consequence of this finding is that the use of asymmetric cryptography would possibly lead to overload situations under the investigated conditions.
|