Browse > Article

Analysis of the Blocking Probability for Wireless PKI  

Shin Seung-Soo (동명정보대학교 정보보호학과)
Choi Seung Kwon (충북대학교 전기전자컴퓨터공학부)
Ji Hong-Il (충북대학교 전기전자컴퓨터공학부)
Shin Dong-Hwa (충북대학교 전기전자컴퓨터공학부)
Cho Yong-Hwan (충북대학교 전기전자컴퓨터공학부)
Abstract
this paper, we made out blocking probability analysis for a new authentication structure for reducing the certificate acquisition time which is one of the factors that should be improved in a conventional wireless PKI. A conventional key exchange method simply performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. Besides, we proposed advanced handover method and blocking probability analysis for wireless PKI. Proposed handover method shows reduced handover processing time than conventional method since it can reduce CRL retrieval time. Also, we compared proposed authentication structure and conventional algorithm, and simulation results show that proposed authentication method outperforms conventional algorithm in all environment regardless of call arrival rate, queue service rate, queue size
Keywords
mobile PKI; FIFO; Blocking Probability; CRL; SRP;
Citations & Related Records
연도 인용수 순위
  • Reference
1 V.Boyko, P. Mackenzie, and S. Patel, 'Probably Secure Password-Authenticated Key Exchange Using Diffie-heIlman,' advances in Cryptology-EUROCRYPT' 2000, pp. 156-171, 2000
2 M.Bellare, D. Pointcheval, and P. Rogaway, 'Authenticated Key Exchange Secure Against Dictionary Attacks,' advances in Cryptology-EUROCRYPT' 2000, pp.139-155, 2000   DOI   ScienceOn
3 Thomas Wu, 'The Secure Remote Password Protocol', Internet Society Symp., Network and Distributed Systems Security Symposium, 1998, pp. 97-111
4 . Kwon, and J. Song, 'A Study on the Generalized Agreement and Password Authentication Protocol,' IEICE TRANS. COMMUN., Vol. E83-B, No.9, pp 2044-2050, SEP 2000
5 Sufatrio, K. Lam, 'Mobile IP Registration Protocol : A Security Attack and New Secure Minimal Public-Key Based Authentication,' I-SPAN'99, June 1999   DOI
6 R. Anderson and T. Lomas, 'Fortifying Key negotiation schemes with poorly chosen passwords,' Electronics Letters, 1994, Vol. 30, No. 13   DOI   ScienceOn
7 M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, Internet X.509 Public Key Infrastructure On-line Certificate Status Protocol-OCSP,' RFC2560, 1999
8 S. Bellovin and M. Merritt, Augmented Encrypted Key Exchange', in Proceedings of the First ACM Conference on Computer and Communication Security, pp. 244-250, 193   DOI