IDEAS home Printed from https://ideas.repec.org/a/ids/ijient/v6y2019i1p32-52.html
   My bibliography  Save this article

Heterogeneous network security management

Author

Listed:
  • R. Narmadha

Abstract

The main objective of this paper is to develop authentication delay model for inter domain or intra-domain authentications. Authentication is a security mechanism used to identify mobile nodes (MN) and prevent unauthorised usage when inter-domain or intra domain handoff happens. The latency due to authentication procedure is known as authentication delay. The authentication delay depends on message propagation time, message transmission time, message encryption/decryption time, authentication request service and waiting time at the access point, authentication request service and waiting time at the server, key encryption and decryption time, key generation time and the registration request service and waiting time, etc., In existing systems, authentication delay modelling of homogeneous network domain has been carried out and actual values are not applied for modelling the authentication delay. In the proposed system authentication delay modelling of heterogeneous network domain will be carried out and actual values will be applied for modelling the authentication delay.

Suggested Citation

  • R. Narmadha, 2019. "Heterogeneous network security management," International Journal of Intelligent Enterprise, Inderscience Enterprises Ltd, vol. 6(1), pages 32-52.
  • Handle: RePEc:ids:ijient:v:6:y:2019:i:1:p:32-52
    as

    Download full text from publisher

    File URL: http://www.inderscience.com/link.php?id=100033
    Download Restriction: Access to full text is restricted to subscribers.
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ids:ijient:v:6:y:2019:i:1:p:32-52. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sarah Parker (email available below). General contact details of provider: http://www.inderscience.com/browse/index.php?journalID=167 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.