Abstract
The way towards ubiquitous networking and the provision of high-quality wireless services depends a lot on the security levels the modern wireless networks offer. Heterogeneous coverage is going to be as successful and reliable as the extent to which different networks can achieve intradomain and interdomain security.
In this chapter, the security of wireless networks is addressed. First, general security aspects and requirements are presented. Then, the main security characteristics of different wireless networks are examined. GSM, UMTS, wireless local area network (WLAN), and WiMAX are the major types of networks presented in terms of integrated security features and countermeasures against selfish/malicious behavior and identified vulnerabilities. The security of ad hoc networks is also addressed. The biggest advantage of these networks, flexibility, is at the same time the reason for many open security-related issues addressed in this work. Many technical details, practices, and strategies of all the networks mentioned previously are discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
T.M. Swaminatha, C.R. Elden: Wireless Security and Privacy: Best Practices and Design Techniques (Addison Wesley, Boston, USA 2002)
A. Mehrotra: GSM System Engineering (Artech House, Norwood, USA 1997)
S.M. Pedl, M.K. Weber, M.W. Oliphant: GSM and Personal Communications Handbook (Artech House, Norwood, USA 1998)
P. Chandra: Bulletproof Wireless Security-GSM, UMTS, 802.11 and AdHoc Security (Elsevier, Newnes 2005)
H. Kaaranen, A. Ahtiainen, L. Laitinen, S. Naghian, V. Niemi: UMTS Networks-Architecture, Mobility and Services (Wiley, New York, USA 2005)
W. Granzow: 3rd Generation Mobile Communications Systems, Ericsson Eurolab Deutschland (2000)
R. Nichols, P. Lekkas: Wireless Security-Models, Threats and Solutions (McGraw-Hill, 2002)
A.E. Earle: Wireless Security Handbook (Auerbach Publications, Boca Raton, USA 2006)
L. Nuaymi: WiMAX-Technology for Broadband Wireless Access (Wiley, West Sussex, UK 2007)
W. Diffie, M. Hellman: New directions in cryptography, IEEE Trans. Inf. Theory 22(6), 644–652 (1976)
C.E. Shannon: Communication theory of secrecy systems, Bell Syst. Tech. J. 29, 656–715 (1949)
A.D. Wyner: The wire-tap channel, Bell Syst. Tech. J. 54, 1355–1387 (1975)
I. Csiszar, J. Korner: Broadcast channels with confidential messages, IEEE Trans. Inf. Theory 24(3), 339–348 (1978)
S.K. Leung-Yan-Cheong, M.E. Hellman: The Gaussian wiretap channel, IEEE Trans. Inf. Theory 24(4), 451–456 (1978)
U.M. Maurer: Secret key agreement by public discussion from common information, IEEE Trans. Inf. Theory 39(3), 733–742 (1993)
U.M. Maurer: Information-theoretically secure secret-key agreement by NOT authenticated public discussion. In: Advances in Cryptology – EUROCRYPT ’97, Lecture Notes in Computer Science, Vol. 1233, ed. by W. Fumy (Springer, Berlin Heidelberg 1997) pp. 209–225
U.M. Maurer, S. Wolf: Information-theoretic key agreement: from weak to strong secrecy for free. In: Advances in Cryptology – EUROCRYPT 2000, Lecture Notes in Computer Science, Vol. 1807, ed. by B. Preneel (Springer, Berlin Heidelberg 2000) pp. 351–368
U.M. Maurer, S. Wolf: Secret-key agreement over unauthenticated public channels – Part I: Definitions and a completeness result, IEEE Trans. Inf. Theory 49(4), 822–831 (2003)
U.M. Maurer, S. Wolf: Secret-key agreement over unauthenticated public channels – Part II: The simulatability condition, IEEE Trans. Inf. Theory 49(4), 832–838 (2003)
U.M. Maurer, S. Wolf: Secret-key agreement over unauthenticated public channels – Part III: Privacy Amplification, IEEE Trans. Inf. Theory 49(4), 839–851 (2003)
A. Sayeed, A. Perrig: Secure Wireless Communications: Secret Keys through Multipath, Proc. IEEE 2008 Conference on Acoustics, Speech and Signal Processing (2008) pp. 3013–3016
J. Barros, M. Bloch: Strong Secrecy for Wireless Channels, Int. Conference on Information-Theoretic Security, Calgary (2008)
H. Sizun: Radio Wave Propagation for Telecommunication Applications (Springer, Berlin Heidelberg 2005)
J. Barros, M.R.D. Rodrigues: Secrecy capacity of wireless channels, Proc. IEEE Int. Symposium on Information Theory (ISIT), Seattle (2006)
M. Bloch, J. Barros, M.R.D. Rodrigues, S.W. McLaughlin: An opportunistic physical-layer approach to secure wireless communications, Proc. 44th Allerton Conference on Communication Control and Computing, Allerton (2006)
M. Bloch, J. Barros, M.R.D. Rodrigues, S.W. McLaughlin: Wireless Information-Theoretic Security – Part I: Theoretical Aspects (2006), available at http://arxiv.org/abs/CS/0611120v1
M. Bloch, J. Barros, M.R.D. Rodrigues, S.W. McLaughlin: Wireless Information-Theoretic Security – Part II: Practical Implementation (2006), available at http://arxiv.org/abs/CS/0611121v1
J.S. Seybold: Introduction to RF Propagation (Wiley Interscience, Hoboken, NJ 2005)
A. Aguiar, J. Gross: Wireless Channel Models, Telecommunication Networks Group, Technical University Berlin, April 2003, Berlin
T. Rappaport: Wireless Communications: Principles and Practice, 2nd edn. (Prentice Hall, Upper Saddle River, NJ 2001)
T. Chrysikos, G. Georgopoulos, K. Birkos, S. Kotsopoulos: Wireless Channel Characterization: On the validation issues of indoor RF models at 2.4 GHz, Pacet (Panhellenic Congress of Electronics and Communications), Patras, Greece, March 20–22 (2009)
H. Suzuki: A statistical model for urban radio propagation, IEEE Trans. Commun. 7(25), 673–680 (1977)
Y. Liang, H.V. Poor, S. Shamai: Secure communication over fading channels, IEEE Trans. Inf. Theory 54, 2470–2492 (2008)
L. Buttyan, J. Hubaux: Security and Cooperation in Wireless Networks-Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing (Cambridge Univ. Press, Cambridge 2007)
M. Shi, X. Shen, J.W. Mark, D. Zhao, Y. Jiang: User authentication and undeniable billing support for agent-based roaming service in WLAN/cellular integrated mobile networks, Comput. Netw. 52, 1693–1702 (2008)
S. Lin, O. Yi, C. Jung, K. Bang: A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro, COMSWARE 2007 (2007) pp. 1–7
P. Kim, Y. Kim: New authentication mechanism for vertical handovers between IEEE 802.16e and 3G wireless networks, Int. J. Comput. Sci. Net. Secur. 6(9B), 138–142 (2006)
V.K. Gondi, N. Agoulmine: Secured Roaming Over WLAN and WIMAX Networks, IEEE/IFIP Int. Workshop on Broadband Convergence Networks (2007) pp. 1–12
N. Krichene, N. Boudriga: Securing Roaming and Vertical Handover between Mobile WiMAX and UMTS, New Technologies, Mobility and Security (2008) pp. 1–5
H. Wang, A.R. Prasad: Security Context Transfer in Vertical Handover, PIMRC 2003, Vol. 3 (2003) pp. 2775–2779
H. Wang, A.R.Prasad: Fast Authentication for Inter-domain Handover, Telecommunications and Networking – ICT 2004 (Springer, 2004) pp. 973–982
X. Fu, D. Hogrefe, S. Narayanan, R. Soltwisch: QoS and Security in 4G Networks, Proc. 1st Annual Global Mobile Congress (2004)
M. Lee, S. Park: A secure context management for QoS-aware vertical handovers in 4G networks. In: Communication and Multimedia Security, Lecture Notes in Computer Science, Vol. 3677, ed. by G. Goos, J. Hartmanis, J. van Leeuwen (Springer, Heidelberg, Germany 2005) pp. 220–229
X. Fu, T. Chen, A. Festag, G. Schafer, H. Karl: SeQoMo architecture: Interactions of security, QoS and mobility components, TKN Technical Reports Series, TKN-02-008
M. Lee, J. Kim, S. Park: A location-aware secure interworking architecture between 3GPP and WLAN systems. In: Information Security and Cryptology – ICISC’2004, Lecture Notes in Computer Science, Vol. 3506, ed. by G. Goos, J. Hartmanis, J. van Leeuwen (Springer, Heidelberg, Germany 2005) pp. 394–406
A. Gupta, A. Mukherjee, B. Xie, D.P. Agrawal: Decentralized key generation scheme for cellular-based heterogeneous wireless Adhoc Networks, J. Parallel Distrib. Comput. 67, 981–991 (2007)
Y. Sun, W. Trappe, K.J.R. Liu: A scalable multicast key management scheme for heterogeneous wireless Networks, IEEE Trans. Netw. 12, 653–666 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Birkos, K., Chrysikos, T., Kotsopoulos, S., Maniatis, I. (2010). Security and Quality of Service in Wireless Networks. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-04117-4_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04116-7
Online ISBN: 978-3-642-04117-4
eBook Packages: EngineeringEngineering (R0)