PERFORMANCE EVALUATION OF AAA / MOBILE IP AUTHENTICATION

From this document you will learn the answers to the following questions:

What type of network is used in the study of IETF?

What is the AAA infrastructure called?

What kind of algorithms are used that require 100 times the processing capabilities of algorithms currently envisaged by the IETF?

Similar documents
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Denial of Service Protection for Optimized and QoS-aware Handover Based on Localized Cookies

A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

Introduction to Security and PIX Firewall

Securing IP Networks with Implementation of IPv6

Transport Layer Protocols

Mobility Management Advanced

TLS and SRTP for Skype Connect. Technical Datasheet

Chapter 7 Transport-Level Security

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks

Security vulnerabilities in the Internet and possible solutions

Dynamic Home Agent Reassignment in Mobile IP

Cleaning Encrypted Traffic

Introducing Reliability and Load Balancing in Mobile IPv6 based Networks

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Network Security Part II: Standards

Final for ECE374 05/06/13 Solution!!

Influence of Load Balancing on Quality of Real Time Data Transmission*

Internet Protocol Security IPSec

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Authentication, Authorization and Accounting (AAA) Protocols

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

21.4 Network Address Translation (NAT) NAT concept

A Security Architecture for Mobility-Related Services

Secure Networking Using Mobile IP

Figure 1: Application scheme of public key mechanisms. (a) pure RSA approach; (b) pure EC approach; (c) RSA on the infrastructure

Chapter 9. IP Secure

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

TCP for Wireless Networks

Performance Analysis of the IEEE Wireless LAN Standard 1

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Secure SCTP against DoS Attacks in Wireless Internet

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

White Paper. Mobility and Mobile IP, Introduction. Abstract

Mobile IP Part I: IPv4

T Cryptography and Data Security

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

An Experimental Study on Wireless Security Protocols over Mobile IP Networks

REDUCING PACKET OVERHEAD IN MOBILE IPV6

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Cisco Integrated Services Routers Performance Overview

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

IPsec Details 1 / 43. IPsec Details

Chapter 4 Virtual Private Networking

Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Network Authentication X Secure the Edge of the Network - Technical White Paper

Chapter 3. Network Domain Security

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

5. Security in the IPN

Communication Systems SSL

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Monitoring Remote Access VPN Services

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Security Policy Revision Date: 23 April 2009

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

PFS scheme for forcing better service in best effort IP network

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Network Security Protocols

Seamless Handover of Streamed Video over UDP between Wireless LANs

The English translation Of MBA Standard 0301

GS1 Trade Sync Connectivity guide

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5),

A SEAMLESS MOBILE VPN DATA SOLUTION FOR UMTS AND WLAN USERS

Flexible mobility management strategy in cellular networks

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Review: Lecture 1 - Internet History

BSI TR : Secure Transport. Requirements for Service Providers (EMSP) regarding a secure Transport of s

IP Traffic Engineering over OMP technique

RARP: Reverse Address Resolution Protocol

KNX IP using IP networks as KNX medium

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Overview of VoIP Systems

Overview. SSL Cryptography Overview CHAPTER 1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Monitoring Traffic manager

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

VPN. Date: 4/15/2004 By: Heena Patel

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

Gateway Service for Integration of Heterogeneous Networks using Different Interworking Solutions

Mobile SCTP Transport Layer Mobility Management for the Internet

How To Analyze The Security On An Ipa Wireless Sensor Network

Chapter 8 Virtual Private Networking

International Telecommunication Union. IETF Security Work. Magnus Nyström. Technical Director, RSA Security Presentation made on behalf of the IETF

Transcription:

PERFORMANCE EVALUATION OF AAA / MOBILE IP AUTHENTICATION A. Hess, G. Schäfer [hess,schaefer]@ee.tu-berlin.de Telecommunication Networks Group, Technische Universität Berlin, Germany Abstract This article 1 describes a simulation study of the performance of the current IETF approach to authenticating mobile nodes by means of an integrated Authentication, Authorization and Accounting (AAA) infrastructure. The main findings of the study are: 1) the delay experienced by a mobile node in case of a full authentication dialogue involving entities of the mobile node s home network is largely determined by the end-to-end delay between the foreign and the home network, 2) the workload of AAA servers remains moderate in case of a load- and mobility model inspired by established values of GSM networks as well as in case of a more progressive mobility model [5], and 3) the workload of AAA servers grows infinitely under both mobility models if cryptographic algorithms are used that require about 100 (30) times the processing capabilities of algorithms currently envisaged by the IETF (cryptographic hash functions and symmetric encryption). An important consequence of this finding is that the use of asymmetric cryptography would possibly lead to overload situations under the investigated conditions. Keywords: Authentication, Mobile IP, Cellular Networks, Performance 1 INTRODUCTION Upcoming next generation mobile communications networks aim not only to offer Internet Protocol (IP) connectivity to customers, but also to be designed themselves on the basis of the Internet Protocol suite. One important development in this direction is the deployment of the Mobile IP protocol [6, 7, 8] in the Radio Access Network (RAN) of next generation cellular networks. However, there still remain some open questions regarding the realization of the authentication of mobile devices during handover operations, which are currently subject to intensive engineering and development efforts inside and outside the Internet Engineering Taskforce (IETF). The principal approach of the IETF in this respect is to integrate authentication during Mobile IP registration with a general Authentication, Authorization and Accounting (AAA) infrastructure based on the so-called Diameter protocol [3]. The main focus of authentication in this respect is the problem of securely identifying entities for IP access in a mobile network with roaming capabilities. Strongly related to this problem is the task of managing the cryptographic keys that are needed for secure entity authentication and data origin authentication for signalling messages, respectively. A special requirement to the authentication infrastructure arises out of the fact that mobile devices require frequent handovers from one access point to another. These handovers can either 1 This work has been supported by a grant from Siemens AG.

Figure 1: Overview of the simulation model occur between access points of different network providers ( intra-domain handover ) or between access points of different network providers ( inter-domain handover ). An important issue is the performance of the (re-)authentication during a handover operation. In order to assess the performance impact of the authentication procedure on handover events we developed a simulation model which takes into account three different types of handover events and analysed this model with two different traffic models. In the next section we give an overview of our simulation model. Section 3 discusses the different handover types to be considered and section 4 describes the two traffic models we used for our study. In section 5 we describe the parameters (message lengths, processing times, etc.) we assumed and in section 6 we discuss the results of our study before drawing some conclusions in the final section 7. 2 THE SIMULATION MODEL The simulation model (see also figure 1) realised during this study consists of one home agent (HA) connected with one AAA home server (AAAH), which itself is connected with two AAA local servers (AAAL). Each AAAL is responsible for a domain consisting of 20 foreign agents, which are each responsible for one cell ( mobile environment, MOBEN). Each cell represents a portion of 4000 mobile nodes. The modules are connected with each other as follows: Mobile Environment Foreign Agent via Wireless link (2 MBit/s datarate). Foreign Agent AAA Local Server via Local link (2 MBit/s datarate). AAA Local Server AAA Local Server via Backbone link (100 MBit/s datarate). AAA Local Server AAA Home Server: delay is dominating 20, 50, 100 ms. AAA Home Server Home Agent via Local link (2 MBit/s datarate). The data rate is specified in bits/second, and it is used for transmission delay calculation. The sending time of a message normally corresponds to the transmission of the first bit, and the arrival time of a message corresponds to the reception of the last bit. Furthermore, we take the end-to-end delay into account during the simulations.

AAAL AMA HAA AMA AAAL 2 HA AAAH AMR HAR AMR Reg_Request AMR Reg_Request AMR AAAL 1 Reg_Request AMR AAAL HO-1 MOBEN FA AMA HO-2 MOBEN FA AMA HO-3 MOBEN FA AMA Reg_Reply Reg_Reply Reg_Reply (a) Type 1 Handover (b) Type 2 Handover (c) Type 3 Handover Figure 2: Message Flow During the three Types of Handover Events 3 THE HANDOVER TYPES During the design of our simulation study, we examined in detail the Diameter protocol, its message formats and the interworking with the Mobile IP registration procedure in order to identify parameters for the performance study. As a result three types of handover operations and the lengths of the messages to be exchanged during these operations have been identified (see also figure 2): A type-1 handover ( standard handover ) occurs when a mobile node changes into a radio cell which is handled by a different foreign agent which itself is connected to the same local AAA server. All draft versions of the Mobile IP application of the Diameter protocol up to version draft-ietf-aaa-diameter-mobileip-07.txt [4] include support for an optimized authentication dialogue which re-uses previously established session keys between the old foreign agent and the mobile node, as well as between the old foreign agent and the home agent. A handover of type-2 occurs when a mobile node moves to a radio cell, that is managed by a foreign agent which is connected to a different local AAA server, but both the old and the new local AAA servers belong to the same administrative domain (e.g. network operator). While this case is not explicitely specified in the Diameter standardization drafts, it is a natural extension to the type-1 handover and it reflects current practice from other cellular networks, e.g. GSM. The third type of handover operations occurs when a mobile node registers for the first time in a foreign network, changes into a foreign network of another administrative domain or when a security context previously established with a visited foreign network expires. This handover type requires involvement of the AAA server of the mobile node s home network resulting in an increased delay to complete the handover due to one Internet roundtrip time. Thus, by minimizing the number of type-3 handover operations a better overall performance can be experienced by mobile users. However, it has to be stated, that during the course of ongoing discussions in the IETF s AAA working group, the support for optimization of local handover operations has been eliminated from the current set of Diameter specifications. The reason for this was mainly, that there were a couple of open questions of local handover optimization for Mobile IP

that needed to be resolved before Diameter could support this feature, and that the Diameter specification had to be finished in order to get RFC status for it. As a consequence, the current set of Mobile IP and Diameter specifications requires a full authentication also involving the home AAA server for every handover performed by a mobile node. Nevertheless, it is expected that support for local handover optimization will be integrated into the Diameter specifications as soon as the remaining issues are resolved in the Mobile IP standards. Therefore, we examined the performance of the three types of handover operations when deployed in a representative network configuration with two different mobility models. For each of the above handover types we modelled the message flow occuring during a handover operation (see also figure 2). 4 THE TRAFFIC MODELS In the following we describe shortly two alternative mobility models that have been integrated into the simulation model. In the first traffic model for every cell three independent processes generate handover operations of the three handover types described above. The arrival process of handover operations is modeled with a Poisson process leading to exponentially distributed inter-arrival times. Within the area of a single cell, the average number of mobile nodes is invariant and therefore, the rate of incoming mobile nodes equals the rate of outgoing mobile nodes. More specifically, traffic model 1 makes the following assumptions: Each cell is assumed to handle 4000 mobile nodes and each mobile node performs: 1.8 Type 1 handover operations per hour 0.2 Type 2 handover operations per hour 1 Type 3 handover operation every 4 hours Mobile nodes are just modeled at the moments when an authentication operation has to be performed. Thus, in every cell three independent processes generate handover operations of the three types: Mean inter-arrival time of type 1 HO: 0.5 s Mean inter-arrival time of type 2 HO: 4.5 s Mean inter-arrival time of type 3 HO: 3.6 s The second traffic model is a simplified version of the model described in [5]. We adopted the idea of three different moving environments, but we did not include a map as a base for moving directions and decisions. In this traffic model a cell has the shape of a circle with a diameter of 1000m. From the mobility viewpoint, we consider the following mobile node categories: pedestrians (1000 per cell) with a speed following the Gaussian distribution with mean value 5 km/hour and variance 30%,

Table 1: Process Parameters Parameter Value Hostname 20 byte Network Access Identifier 20 byte Authorization Lifetime 4 byte Authenticator 16/20 byte (MD5/SHA-1) Key 16 byte TCP-Header (without options) 20 byte ESP-Header 8 byte ESP-Authentication Extension 16 byte Hashing 512 bit with MD-5 1.5 µs Hashing 512 bit with SHA-1 3.73 µs Encrypting n * 64 bit with DES 3.06 µs + n * 1.51 µs Encrypting n * 64 bit with 3DES 9.17 µs + n * 4.14 µs Physical Layer Overhead 192 µs MAC Layer Overhead 136 µs IP Layer Overhead 80 µs UDP Layer Overhead 32 µs car passengers (1000 per cell) with a speed following the Gaussian distribution with mean value 20 km/hr and variance 30%, and users located in buildings (2000 per cell). The rate of each category stays invariant during simulations. Regarding the invocation of each of the handover types described in section 3 traffic model 2 makes the following assumptions: To invoke an authentication process of type 1, the moving mobile node has to travel a distance described through a Gaussian distribution with mean value 500 m and a variance of 100. To invoke an authentication process of type 2, the moving mobile node has to travel a distance of 2500 m with a variance of 100. Authentication operations of type 3 are generated in the same manner as in traffic model 1. 5 PROCESS PARAMETERS Table 1 lists our assumptions on the process parameters. The estimation of the processing times for cryptographic operations are based on results from Bosselaers [1, 2] that have been projected according to reflect technological progress concerning computation speed of modern processors.

Table 2: Processing Times Action Type-1 Type-2 Type 3 MOBEN: MD5 + DES Encrypting + (Signing): Registration Request 3 µs 5 µs 3 µs Decrypting: Registration Reply 3 µs 3 µs 5 µs FA: MD5 + DES (De-) + Encrypting + Signing: AMR 48 µs 45 µs 88 µs Decrypting + Signing: Registration Reply 69 µs 69 µs 100 µs AAAL: MD5 + DES (De-) + Encrypting + Signing: AMR 91/112 µs 175 µs (De-) + Encrypting + Signing: AMA 112 µs 133 µs 190 µs AAAH: MD5 + DES (De-) + Encrypting + Signing: HAR 195 µs (De-) + Encrypting + Signing: AMA 195 µs HA: MD5 + DES (De-) + Encrypting + Signing: HAA 207 µs MOBEN: SHA-1 + 3DES Encrypting + (Signing): Registration Request 8 µs 11 µs 8 µs Decrypting: Registration Reply 8 µs 8 µs 11 µs FA: SHA-1 + 3DES (De-) + Encrypting + Signing: AMR 131 µs 128 µs 238 µs Decrypting + Signing: Registration Reply 188 µs 188 µs 270 µs AAAL: SHA-1 + 3DES (De-) + Encrypting + Signing: AMR 247/304 µs 476 µs (De-) + Encrypting + Signing: AMA 304 µs 362 µs 518 µs AAAH: SHA-1 + 3DES (De-) + Encrypting + Signing: HAR 524 µs (De-) + Encrypting + Signing: AMA 577 µs HA: MD5 + DES (De-) + Encrypting + Signing: HAA 603 µs As written in [3] Diameter clients, such as Network Access Servers (NASes) and Foreign Agents must support IP Security. Diameter servers must support TLS, but the administrator may opt to configure IPSec instead of using TLS. Operating the Diameter protocol without any security mechanism is not recommended. We assumed the usage of IPSec, more precisely the IP Encapsulating Security Payload (ESP). Table 2 depicts all resulting processing times.

Table 3: Comparison: Traffic Model 1 Traffic Model 2 HO-1 HO-2 HO-3 Traffic Model 1 Mean authentication delay [ms] 4.93439 5.38846 52.5111 Standard deviation [ms] 3.26195e-06 1.63216e-06 2.0332e-05 Traffic Model 2 Mean authentication delay [ms] 4.94512 5.39541 52.5238 Standard deviation [ms] 1.34515e-05 5.41181e-06 2.92187e-06 6 RESULTS OF THE STUDY The main goal of our simulation study is to evaluate the performance of integrated AAA / Mobile IP authentication according to the following measures: authentication delay, that is the time between the client starting to create a registration request until the completion of the registration after the last successful signature verification by the mobile node, time spent for cryptographic computations of an authentication dialogue, time spent for message transmission of an authentication dialogue, and throughput of an AAA server, that is the number of finished authentication tasks per second. Furthermore, we examine the queues that are involved in the authentication process, focusing on the lengths of the queues and on the time spent inside these queues. Before running the simulation model we determined a simulation end that is reached when one cell has finished a certain amount of handover operations. In other words, we do not define an exact number of total handover operations to be simultated, but an upper limit on it. If one cell has reached the determined amount of successful handover operations the simulation is immediately stopped. Therefore, not every cell executes the same amount of handover operations. 6.1 INFLUENCE OF THE TRAFFIC MODEL ON THE AUTHENTICA- TION DELAY Examining several runs of the simulation module with both traffic models and using MD5 / DES for the cryptographic operations, we receive the values (simulation end 320.000 handovers) of table 3. As could be expected, we see that the delay experienced by a mobile node in case of a full authentication dialogue involving entities of the mobile node s home network (handover type 3) is largely determined by the end-to-end delay between the foreign and the home network. Furthermore, running a simulation using traffic model 2, the execution needs only about a fourth of the simulation time compared to running the model

with the first traffic model. Consequently, we receive only about a fourth of handover operations of type 3, when using traffic model 2. Additionally, we can see that the differences between the mean authentication delays for the corresponding handover types of each traffic model are infinitesimal. Thus, we can conclude that the time spent inside waiting queues does only differ about the same quantity. In numbers we receive the following results (mean value / standard deviation): Traffic Model 1: 0.96055 µs / 1.41022 ns Traffic Model 2: 3.68267 µs / 4.77504e ns. The difference between both mean values is about 2.5 µs, which is not very much compared to the mean authentication delay over all handovers of type 2 (5.38846 ms). Summarizing, both traffic models in combination with MD5/DES do not lead to a bottleneck situation. During both scenarios the mean queue time over all handover operations of each type is so low that an influence on the authentication delay is not noticeable. Running the simulation model using traffic model 1, the values to be measured stay invariant after a short starting phase. On the other hand, using traffic model 2 the inital phase lasts much longer. Furthermore, the usage of traffic model 2 results in a higher demand to the modules involved in handover operations of type 1 and type 2 compared to traffic model 1. 6.2 INFLUENCE OF CRYPTOGRAPHIC PROCESSING TIMES In order to assess the influence of cryptographic processing times on the overall handover performance, we started to multiply the processing times (based on the SHA-1/3DES processing times and message lengths) with different factors until a bottle-neck situation occured. The following results were received with the usage of traffic model 1. Figure 3 depicts the mean authentication delay of handover processes of type 1 for different multiple of the processing times for SHA-1/3DES. We see that the model stays stable until reaching a factor of 100. For factors bigger than 100 more and more messages are waiting to be processed inside the queues. The same behaviour is obeservable for handover operations of type 2 and type 3. Therefore, it is not possible to determine a mean value for the authentication delay for a factor of 100 or bigger. The bottle-neck situation is caused through both AAA local servers. In figure 4 the average queue length of the AAAL Request Queue and the AAAL Answer Queue of AAAL 2 are shown. The length of the displayed queues stays stable. However, for a factor of 100 (see figure 4.b) we see that the system is not stable anymore. For a factor of 100 only the AAAL Answer Queue is depicted in figure 4.a, and not the AAAL Request Queue which is depicted in figure 4.b. It can be seen that the request queue of the local AAA server grows constantly in this case. However, this effect of an infinitely growing request queue does not occur at the home AAA server for a factor of 100, so that it is the local AAA server that can be identified as a bottleneck for increased cryptographic processing requirements. In a next step we ran the simulation model using traffic model 2 for traffic generation. The behaviour of the simulation model resembled the behaviour described above, except that the bottle-neck situation was reached already at a factor of 30. Running the simulation

1.4 1.2 Authentication Delay HO1: SHA-1/3DES Authentication Delay HO1: factor 10 Authentication Delay HO1: factor 30 Authentication Delay HO1 : factor 50 Authentication Delay HO1: factor 80 Authentication Delay HO1: factor 90 1000 800 Authentication Delay HO1: SHA-1/3DES Authentication Delay HO1: factor 100 Authentication Delay HO1: factor 90 Authentication Delay HO1: factor 200 1 Authentication delay [s] 0.8 0.6 Authentication delay [s] 600 400 0.4 200 0.2 0 0 500 1000 1500 2000 2500 3000 0 0 500 1000 1500 2000 2500 3000 Simulation time [s] Simulation time [s] (a) Delay for factors between 1 and 90 (b) Delay for factors between 1 and 200 Figure 3: Authentication Delay of HO1 for Different Processing Times model with the processing times corresponding to the factor of 30, again the length of both AAAL Request Queues grow constantly. Already at factor of 20 the mean authentication processing time for handover operations of type 2 is bigger than the mean value of handover operations of type 3. Using traffic model 2 for the traffic generation, the system gets unstable earlier. The enlargement of the processing times while using traffic model 2, has an obvious effect on the system. This is due to the higher arrival rate of handover requests compared to traffic model 1. So summarizing, the simulation model starts to get instable at a factor of 100 for traffic model 1 and at a factor of 30 for traffic model 2. One result of the simulation study shows (see figure 3) that the workload of AAA servers grows infinitely under both mobility models if cryptographic algorithms are used that require about 100 (30) times the processing capabilities of algorithms currently envisaged by the IETF (cryptographic hash functions and symmetric encryption). 50 45 40 AAAL2 Req Length: factor 80 AAAL2 Answer Length: factor 80 AAAL2 Req Length: factor 90 AAAL2 Answer Length: factor 90 AAAL2 Answer Length: factor 100 4000 3500 AAAL2 Req Length: factor 80 AAAL2 Answer Length: factor 80 AAAL2 Req Length: factor 90 AAAL2 Answer Length: factor 90 AAAL2 Req Length: factor 100 AAAL2 Answer Length: factor 100 3000 35 Queue length 30 25 20 Queue length 2500 2000 1500 15 1000 10 5 500 0 0 500 1000 1500 2000 2500 3000 Simulation time [s] 0 0 500 1000 1500 2000 2500 3000 Simulation time [s] (a) AAAL 2 Answer and Request Queue Lengths for Factors between 80 and 90 (b) AAAL 2 Request Queue Length for a Factor of 100 Figure 4: AAAL 2 Queue Lengths for Different Processing Times

7 CONCLUSIONS The results of our simulation study show, that: 1. The delay experienced by a mobile node in case of a full authentication dialogue involving entities of the mobile node s home network is largely determined by the end-to-end delay between the foreign and the home network. 2. The workload of AAA servers remains moderate in case of a load- and mobility model inspired by established values of GSM networks as well as in case of a more progressive mobility model [5]. 3. The workload of AAA servers grows infinitly under both mobility models if cryptographic algorithms are used that require about 100 (30) times the processing capabilities of algorithms currently envisaged by the IETF (cryptographic hash functions and symmetric encryption). An important consequence of the third finding is that the use of asymmetric cryptography would possibly lead to overload situations under the investigated conditions, as those operations often require processing capabilities in this range. References [1] A. Bosselaers. Fast Implementations [of Cryptographic Algortihms] on the Pentium. http://www.esat.kuleuven.ac.be/ bosselae/fast.html. [2] A. Bosselaers, R. Govaerts, and J. Vandewalle. Fast Hashing on the Pentium. In N. Koblitz, editor, Advances in Cryptology, Proceedings Crypto 96, pages 298 312. Springer, 1996. Vol. 1109 of Lectures Notes in Computer Science. [3] P. Calhoun, H. Akhtar, J. Arkko, E. Guttman, A. Rubens, and G. Zorn. Diameter Base Protocol. Internet Draft, work in progress, June 2001. http://search.ietf. org/internet-drafts/draft-ietf-aaa-diameter-06.txt. [4] P. R. Calhoun and C. E. Perkins. Diameter Mobile IPv4 Application. Internet Draft, work in progress, July 2001. http://search.ietf.org/ internet-drafts/draft-ietf-aaa-diameter-mobileip-07.txt. [5] J.G. Markoulidakis, G.L. Lyberopoulos, and M.E. Anagnostou. Traffic Model for Third Generation Cellular Mobile Telecommunication Systems. To appear in Intern. Journal of Wireless Information Networks. http://www.telecom.ntua.gr/ ymark/. [6] C. Perkins. IP Mobility Support. Internet RFC 2002, 1996. [7] C. Perkins. Mobile IP Design Principles and Practices. Number ISBN: 0-201-63469. Addison-Wesley Longman, Reading, MA, USA, 1998. [8] J. Solomon. Mobile IP: The Internet unplugged. Number ISBN: 0-13-856246-6. Prentice Hall, Englewood Cliffs, New Jersey, USA, 1998.