Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2005
…
7 pages
1 file
We are nowadays immersed in a great number of networks that permit us to have access to the information systems. Although it is a reality, there is a lack of interoperability between different networks, which would allow us a more universal access to the information systems. This paper presents an hybrid network architecture in order to achieve the integration of
As wireless networks are rapidly deployed, the security of wireless environments will be mandatory. Considering the inherent security limitations of Ad Hoc networks, we propose a new architecture: Hierarchical Hybrid networks for secure wireless networking. In such a network, wireless nodes are organized into groups. We present a secure communication scheme to defend against link attacks. Secure mobility support for mobile hosts roaming among groups is also discussed. Mutual authentication is used to protect both foreign groups and mobile hosts. We propose a fault-tolerant authentication scheme to make systems survivable from agent failures. These security schemes take into account the characteristics of wireless networks.
The Objective of our Paper is to implement Wireless Infrastructure network at Computer System Department. The wireless infrastructure to be created is seen as complementary to the LAN infrastructures already in place. The objective is also to facilitate mobility and, in particular, the information access, exchange and sharing among the users.
2010
Hybrid Wireless Mesh Network is a special case of infrastructural mesh network which utilizes heterogeneous wireless networks for communication. The integration of WMNs with other networks such as the Internet, cellular, IEEE 802.11, IEEE 802.15, IEEE 802.16, sensor networks, etc., can be accomplished through the gateway and bridging functions in the mesh routers. An integrated security mechanism is a key challenge in the integration on such networks. In this paper, we analyze the problems in the integration of various heterogeneous wireless network's. Thereafter, we proposed a integrated security framework for the hybrid WMN which helps in building a secured environment for communication within the network. The proposed mechanism efficiently uses the characteristics of WMN's, mutual authentication and secretes key cryptography to provide a integrated security for heterogeneous wireless mesh networks.
2015
NGN is an IP based heterogeneous network environment, converges wired and wireless network technologies, offer a wide range of services to the customers with generalized mobility. It enables the customers to avail unrestricted services from different service providers of different networks, ensures enhanced and consistent services and reduces network and operational complexities. NGN, though, is embedded with unique characteristics of offering voice, data and video services over the same network with guaranteed quality of service, there are numerous critical security issues exist which need to be addressed. There are quite a lot of proposals for the security architecture of the NGN, but the ever growing vulnerabilities, threats and the attacks on NGN environment, demand the necessity for NGN security mechanisms. Hence, in this paper, a novel integrated security architecture for NGN has been proposed.
Proceedings of IEEE Singapore International Conference on Networks/International Conference on Information Engineering '93, 2000
Second generation mobile networks, as the Global System for Mobile Communications (GSM) and the Digital European Cordless Telecommunications (DECT) have been studied in the environment of the European mobile communications. These networks will be used for the nineties. However, third generation for mobile communications are being developed in order to join these networks and to provide a singlc access. This paper claims to givc a description of thc Universal Mobile Telecommunication System (UMTS) and the Future Public Land Mobile Telecommunications Systems (EPLMTS) and to make a comparison between them with regards to security. For this purpose, several aspects of security mainly related to security services and security architecture are specially studied for both systems. The UMTS network is being developed within the European Commission's Research on Advanced Communications in Europe (RACE) in order to give telephonic mobile support in Europe and the rest of the world in the 2000s. * The purpose of this article is to explain the security architecture of the third generation mobile networks, basically, UMTS network in relation to the FPLMTS network. It is a requirement of both the UMTS and FPLMTS networks the compatibility between them. In the last years, at least four groups have been developing network architectures in the third generation of mobile networks: Task Group 8/1 of the International Consultative Committee on Radio (CCIR) (with the FPLMTS network),
A heterogeneous network is a network that connecting computers and other devices with different operating systems and/or protocols. For example, the local area networks (LANs) that connect Microsoft Windows and Linux based personal computers with Apple Macintosh computers are heterogeneous.[1][2] The word heterogeneous network is also used in wireless networks using different access technologies. For example, a wireless network which provides a service through a wireless LAN and is able to maintain the service when switching to a cellular network is called a wireless heterogeneous network. To balance between the security and performance requirements in such heterogeneous networks from MAC layer to application layer, including a customized context-aware media independent handoff (MIH) framework, a unified access tested for 4G and Wi-Fi integration, a secure fast handoff scheme between different wireless networks, a practical secure routing solution to defend wormhole attack and an novel application for secure application mobility. Keywords—Heterogeneous wireless networks, Context-aware MIH, Unified access, Seamless handoff.
ACM SIGMOBILE Mobile Computing and Communications Review, 2005
The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802,11, WCDMA, cdma2000, and GPRS. An enterprise user desires to be reachable while outside one's enterprise networks and requires minimum interruption while ensuring that the signaling and data traffic is not compromised during one's movement within the enterprise and between enterprise and external networks. We describe the design, implementation and performance of a Secure Universal Mobility (SUM) architecture. It uses standard protocols, such as SIP and Mobile IP, to support mobility and uses standard virtual private network (VPN) technologies (e.g., IPsec) to support security (authentication and encryption.) It uses pre-processing and make-before-break handoff techniques to achieve seamless mobility across heterogeneous radio systems. It separates the handlings of initial mobility management and user application signaling ...
2004
Personal Networks (PN) is a new concept related to pervasive computing with a strong user-focused view. While several existing technologies can offer solutions to part of a person's future communication needs, there is very little work on combining these technologies into something a normal user can handle. It will undoubtedly be the network layer that should integrate a person's all devices and networks into one single network for the person; the Personal Network. This paper introduces a network layer architecture for PNs that can handle the dynamic and demanding situation a PN is facing. Discussions of some related network layer concepts, issues and possible solutions are given in the end of this paper.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
2008
International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2006
Telecommunication Systems, 2007
Computer Networks - COMPUT NETW, 2010
2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops, 2006
Software Engineering, Artificial …, 2008