Simulation measures are needed to evaluate the authentication protocol used in the Global System for Mobile communication (GSM). A simulation model is presented and used to evaluate the delay introduced by the authenti cation protocol used in GSM. The simulation results show the amount of signaling traffic introduced by the authentication messages in GSM systems.
Wilkes, J.E. "Privacy and Authentication Needs of PCS." IEEE Personal Communications, pp 11-15, Aug. 1995 .
2.
Pollini, G.P. , Goodman, D.J. "Signaling System Performance Evaluation for Personal Communications." IEEE Transactions on Vehicular Technology, Vol. 45, No. 1, pp 131-138, Feb. 1996.
3.
D'Aria, G. , Muratore, F., Palestini , V. "Simulation and Performance of the Pan-European Land Mobile Radio System." IEEE Transactions on Vehicular Technology, Vol. 41, No. 2, pp 177-189, May 1992.
4.
Pollini, G.P. , Meier-Hellstern , K.S., Goodman, D.J. "Signaling Traffic Volume Generated by Mobile and Personal Communications." IEEE Communications, pp 60- 65, June 1995.
5.
Reilly, P.L. "Signaling Traffic in the Pan-European Digital Cellular Radio (GSM) System" In IEEE Vehicular Technology Conference , 1992, pp 721-726.
6.
Drozdy, G., Niemela, J., Valimaki, J., Rosenberg, J., Hara, V. "Study of GSM System Performance by a GSM Network Computer Simulator ." In Proceedings of IEEE ICWC'92, pp 336-339, 1992.
7.
CACI Products Company, 3333 North Torrey Pines Court, La Jolla, CA, NETWORK II.5 User's Manual Release 8.0.