[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Security and Quality of Service in Wireless Networks

  • Chapter
Handbook of Information and Communication Security

Abstract

The way towards ubiquitous networking and the provision of high-quality wireless services depends a lot on the security levels the modern wireless networks offer. Heterogeneous coverage is going to be as successful and reliable as the extent to which different networks can achieve intradomain and interdomain security.

In this chapter, the security of wireless networks is addressed. First, general security aspects and requirements are presented. Then, the main security characteristics of different wireless networks are examined. GSM, UMTS, wireless local area network (WLAN), and WiMAX are the major types of networks presented in terms of integrated security features and countermeasures against selfish/malicious behavior and identified vulnerabilities. The security of ad hoc networks is also addressed. The biggest advantage of these networks, flexibility, is at the same time the reason for many open security-related issues addressed in this work. Many technical details, practices, and strategies of all the networks mentioned previously are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 279.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 349.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 499.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. T.M. Swaminatha, C.R. Elden: Wireless Security and Privacy: Best Practices and Design Techniques (Addison Wesley, Boston, USA 2002)

    Google Scholar 

  2. A. Mehrotra: GSM System Engineering (Artech House, Norwood, USA 1997)

    Google Scholar 

  3. S.M. Pedl, M.K. Weber, M.W. Oliphant: GSM and Personal Communications Handbook (Artech House, Norwood, USA 1998)

    Google Scholar 

  4. P. Chandra: Bulletproof Wireless Security-GSM, UMTS, 802.11 and AdHoc Security (Elsevier, Newnes 2005)

    Google Scholar 

  5. H. Kaaranen, A. Ahtiainen, L. Laitinen, S. Naghian, V. Niemi: UMTS Networks-Architecture, Mobility and Services (Wiley, New York, USA 2005)

    Google Scholar 

  6. W. Granzow: 3rd Generation Mobile Communications Systems, Ericsson Eurolab Deutschland (2000)

    Google Scholar 

  7. R. Nichols, P. Lekkas: Wireless Security-Models, Threats and Solutions (McGraw-Hill, 2002)

    Google Scholar 

  8. A.E. Earle: Wireless Security Handbook (Auerbach Publications, Boca Raton, USA 2006)

    Google Scholar 

  9. L. Nuaymi: WiMAX-Technology for Broadband Wireless Access (Wiley, West Sussex, UK 2007)

    Google Scholar 

  10. W. Diffie, M. Hellman: New directions in cryptography, IEEE Trans. Inf. Theory 22(6), 644–652 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  11. C.E. Shannon: Communication theory of secrecy systems, Bell Syst. Tech. J. 29, 656–715 (1949)

    MathSciNet  Google Scholar 

  12. A.D. Wyner: The wire-tap channel, Bell Syst. Tech. J. 54, 1355–1387 (1975)

    MathSciNet  Google Scholar 

  13. I. Csiszar, J. Korner: Broadcast channels with confidential messages, IEEE Trans. Inf. Theory 24(3), 339–348 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  14. S.K. Leung-Yan-Cheong, M.E. Hellman: The Gaussian wiretap channel, IEEE Trans. Inf. Theory 24(4), 451–456 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  15. U.M. Maurer: Secret key agreement by public discussion from common information, IEEE Trans. Inf. Theory 39(3), 733–742 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  16. U.M. Maurer: Information-theoretically secure secret-key agreement by NOT authenticated public discussion. In: Advances in Cryptology – EUROCRYPT ’97, Lecture Notes in Computer Science, Vol. 1233, ed. by W. Fumy (Springer, Berlin Heidelberg 1997) pp. 209–225

    Google Scholar 

  17. U.M. Maurer, S. Wolf: Information-theoretic key agreement: from weak to strong secrecy for free. In: Advances in Cryptology – EUROCRYPT 2000, Lecture Notes in Computer Science, Vol. 1807, ed. by B. Preneel (Springer, Berlin Heidelberg 2000) pp. 351–368

    Chapter  Google Scholar 

  18. U.M. Maurer, S. Wolf: Secret-key agreement over unauthenticated public channels – Part I: Definitions and a completeness result, IEEE Trans. Inf. Theory 49(4), 822–831 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  19. U.M. Maurer, S. Wolf: Secret-key agreement over unauthenticated public channels – Part II: The simulatability condition, IEEE Trans. Inf. Theory 49(4), 832–838 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  20. U.M. Maurer, S. Wolf: Secret-key agreement over unauthenticated public channels – Part III: Privacy Amplification, IEEE Trans. Inf. Theory 49(4), 839–851 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  21. A. Sayeed, A. Perrig: Secure Wireless Communications: Secret Keys through Multipath, Proc. IEEE 2008 Conference on Acoustics, Speech and Signal Processing (2008) pp. 3013–3016

    Google Scholar 

  22. J. Barros, M. Bloch: Strong Secrecy for Wireless Channels, Int. Conference on Information-Theoretic Security, Calgary (2008)

    Google Scholar 

  23. H. Sizun: Radio Wave Propagation for Telecommunication Applications (Springer, Berlin Heidelberg 2005)

    Google Scholar 

  24. J. Barros, M.R.D. Rodrigues: Secrecy capacity of wireless channels, Proc. IEEE Int. Symposium on Information Theory (ISIT), Seattle (2006)

    Google Scholar 

  25. M. Bloch, J. Barros, M.R.D. Rodrigues, S.W. McLaughlin: An opportunistic physical-layer approach to secure wireless communications, Proc. 44th Allerton Conference on Communication Control and Computing, Allerton (2006)

    Google Scholar 

  26. M. Bloch, J. Barros, M.R.D. Rodrigues, S.W. McLaughlin: Wireless Information-Theoretic Security – Part I: Theoretical Aspects (2006), available at http://arxiv.org/abs/CS/0611120v1

  27. M. Bloch, J. Barros, M.R.D. Rodrigues, S.W. McLaughlin: Wireless Information-Theoretic Security – Part II: Practical Implementation (2006), available at http://arxiv.org/abs/CS/0611121v1

  28. J.S. Seybold: Introduction to RF Propagation (Wiley Interscience, Hoboken, NJ 2005)

    Book  Google Scholar 

  29. A. Aguiar, J. Gross: Wireless Channel Models, Telecommunication Networks Group, Technical University Berlin, April 2003, Berlin

    Google Scholar 

  30. T. Rappaport: Wireless Communications: Principles and Practice, 2nd edn. (Prentice Hall, Upper Saddle River, NJ 2001)

    Google Scholar 

  31. T. Chrysikos, G. Georgopoulos, K. Birkos, S. Kotsopoulos: Wireless Channel Characterization: On the validation issues of indoor RF models at 2.4 GHz, Pacet (Panhellenic Congress of Electronics and Communications), Patras, Greece, March 20–22 (2009)

    Google Scholar 

  32. H. Suzuki: A statistical model for urban radio propagation, IEEE Trans. Commun. 7(25), 673–680 (1977)

    Article  Google Scholar 

  33. Y. Liang, H.V. Poor, S. Shamai: Secure communication over fading channels, IEEE Trans. Inf. Theory 54, 2470–2492 (2008)

    Article  MathSciNet  Google Scholar 

  34. L. Buttyan, J. Hubaux: Security and Cooperation in Wireless Networks-Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing (Cambridge Univ. Press, Cambridge 2007)

    Google Scholar 

  35. M. Shi, X. Shen, J.W. Mark, D. Zhao, Y. Jiang: User authentication and undeniable billing support for agent-based roaming service in WLAN/cellular integrated mobile networks, Comput. Netw. 52, 1693–1702 (2008)

    Article  MATH  Google Scholar 

  36. S. Lin, O. Yi, C. Jung, K. Bang: A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro, COMSWARE 2007 (2007) pp. 1–7

    Google Scholar 

  37. P. Kim, Y. Kim: New authentication mechanism for vertical handovers between IEEE 802.16e and 3G wireless networks, Int. J. Comput. Sci. Net. Secur. 6(9B), 138–142 (2006)

    Google Scholar 

  38. V.K. Gondi, N. Agoulmine: Secured Roaming Over WLAN and WIMAX Networks, IEEE/IFIP Int. Workshop on Broadband Convergence Networks (2007) pp. 1–12

    Google Scholar 

  39. N. Krichene, N. Boudriga: Securing Roaming and Vertical Handover between Mobile WiMAX and UMTS, New Technologies, Mobility and Security (2008) pp. 1–5

    Google Scholar 

  40. H. Wang, A.R. Prasad: Security Context Transfer in Vertical Handover, PIMRC 2003, Vol. 3 (2003) pp. 2775–2779

    Google Scholar 

  41. H. Wang, A.R.Prasad: Fast Authentication for Inter-domain Handover, Telecommunications and Networking – ICT 2004 (Springer, 2004) pp. 973–982

    Google Scholar 

  42. X. Fu, D. Hogrefe, S. Narayanan, R. Soltwisch: QoS and Security in 4G Networks, Proc. 1st Annual Global Mobile Congress (2004)

    Google Scholar 

  43. M. Lee, S. Park: A secure context management for QoS-aware vertical handovers in 4G networks. In: Communication and Multimedia Security, Lecture Notes in Computer Science, Vol. 3677, ed. by G. Goos, J. Hartmanis, J. van Leeuwen (Springer, Heidelberg, Germany 2005) pp. 220–229

    Chapter  Google Scholar 

  44. X. Fu, T. Chen, A. Festag, G. Schafer, H. Karl: SeQoMo architecture: Interactions of security, QoS and mobility components, TKN Technical Reports Series, TKN-02-008

    Google Scholar 

  45. M. Lee, J. Kim, S. Park: A location-aware secure interworking architecture between 3GPP and WLAN systems. In: Information Security and Cryptology – ICISC’2004, Lecture Notes in Computer Science, Vol. 3506, ed. by G. Goos, J. Hartmanis, J. van Leeuwen (Springer, Heidelberg, Germany 2005) pp. 394–406

    Google Scholar 

  46. A. Gupta, A. Mukherjee, B. Xie, D.P. Agrawal: Decentralized key generation scheme for cellular-based heterogeneous wireless Adhoc Networks, J. Parallel Distrib. Comput. 67, 981–991 (2007)

    Article  MATH  Google Scholar 

  47. Y. Sun, W. Trappe, K.J.R. Liu: A scalable multicast key management scheme for heterogeneous wireless Networks, IEEE Trans. Netw. 12, 653–666 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Birkos, K., Chrysikos, T., Kotsopoulos, S., Maniatis, I. (2010). Security and Quality of Service in Wireless Networks. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04117-4_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04116-7

  • Online ISBN: 978-3-642-04117-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics