참고문헌
- 3GPP TS 33.401, "Security architecture," Dec., 2009.
- M. Zhang, et al., "Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol," IEEE Trans. Wireless Commun., Mar., 2005. https://doi.org/10.1109/TWC.2004.842941
- 3GPP TR 33.821, "Rationale and track of security decisions in Long Term Evolved (LTE) RAN / 3GPP System Architecture Evolution (SAE)," Jun., 2009.
- D. Forsberg, "LTE Key Management Analysis with Session Keys Context," ELSEVIER Comput. Commun., Oct., 2010.
- Y.-B. Lin, et al., "One-pass GPRS and IMS Authentication Procedure for UMTS," IEEE J. Sel. Areas Commun., Jun., 2005. https://doi.org/10.1109/JSAC.2005.845631
- Y.-B. Lin, et al., "Reducing Authentication Signaling Traffic in Third-Generation Mobile Network," IEEE Trans. Wireless Commun., May, 2003. https://doi.org/10.1109/TWC.2003.811171
- 이호우, "대기행렬이론: 확률과정론적 분석", 시그마프레스 1996.
- U.S. Census Bureau TIGER. http://www.census.gov/geo/www/tiger/
- Y. Zhang et al., "An Improvement for Authentication Protocol in Third-Generation Wireless Networks," IEEE Trans. Wireless Commun, Vol.5, No.9, Sep., 2006. https://doi.org/10.1109/TWC.2006.1687756
- L.-Y. Wu, et al., "Authentication Vector Management for UMTS," IEEE Trans. Wireless Commun., Vol.6, No.11, Nov., 2007. https://doi.org/10.1109/TWC.2007.060245
- J.-A. Saraireh, et al., "A New Authentication Protocol for UMTS Mobile Networks," EURASIP Wireless Commun. and Networking., Oct., 2010.
- S. Pack, et al., "Optimal Binding-Management-Key Refresh Interval in Mobile IPv6 Networks," IEEE Transactions on Vehicular Technology, Vol.58, No.7, Sep., 2009. https://doi.org/10.1109/TVT.2009.2017752