PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Mobile identity management system in heterogeneous wireless networks

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Heterogeneous wireless networks increasingly encroach on our lives. Various technologies and mobile applications more often than usual are now used by mobile users. Intensive development of mobile networks not only sets new standards for radio, but increasingly focuses on providing security for traffic transmitted in wireless networks. Security in wireless networks has never been the primary objective of the designers of new network standards. The reason for this fact were both low hardware resources of equipment, but also lack of awareness of users about the potential vulnerabilities. Creating a secure, independent of network architecture solutions effectively raising the level of security of transmitted data between end users is the main priority of our research. Current wireless security solutions do not provide sufficient protection of the integrity, confidentiality of data, are not designed to operate in heterogeneous networks, or are too complex to implement. Both networks WiMAX, LTE and WiFi, there are methods that protect the resources in these networks, but they are not consistent with each other. The proposed security system requires the use of mobile version of the PKI to verify the identity of mobile users. Mobile PKI center is an innovative solution, not yet introduced for casual use. Such a solution in heterogeneous wireless networks is a fast, secure and transparent to transmission medium. Designing secure and efficient authentication protocols to enable fast connections to the heterogeneous network is challenging. In the proposed system in this paper, the users authenticate their identity digital certificates that are issued by a trusted third party (CA). PKI uses the algorithms based on elliptic curves. Advantages of elliptic curves in mobile environment will be particularly evident. This ensures adequate protection of data in a heterogeneous networks. In this system, it is possible to implement many new secure services for end users secure email, secure chat, secure remote access.
Rocznik
Strony
141--152
Opis fizyczny
Bibliogr. 10 poz.
Twórcy
  • Institute of Telecomunications, Faculty of Electronics and Information Technology, Warsaw University of Technology, Nowowiejska 15/19, 00-665 Warsaw, Poland
autor
  • Institute of Telecomunications, Faculty of Electronics and Information Technology, Warsaw University of Technology, Nowowiejska 15/19, 00-665 Warsaw, Poland
Bibliografia
  • [1] 3GPP2 TSG C.S0024-0 v2.0, cdma2000 High Rate Packet Data Air Interface Specification
  • [2] 3GPP TSG RAN TR 25.848 v4.0.0, Physical Layer Aspects of UTRA High Speed Downlink Packet Access.
  • [3] IEEE Std 802.16e-2005,Air Interface for Fixed and Mobile Broadband Wireless Access Systems
  • [4] IEEE 802.16e-2005, IEEE Standard for Local and metropolitan area networks-Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands (2005).
  • [5] Ahson S., Ilyas M., WiMAX Standards and Security, Aurebach Publications, Taylor & Francis Group (2008).
  • [6] Khan F., LTE for 4G Mobile Broadband, Air Interface Technologies and Performance, Cambridge university Press (2009).
  • [7] Lee Y., Lee J., Song J., Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce, Computer Communications 30(4) (2007).
  • [8] http://www.peak-solution.de/
  • [9] http://www.corisecio.com/
  • [10] Hankerson, Darrel, Menezes, Alfred J., Vanstone, Scott, Guide to Elliptic Curve Cryptography, Springer Professional Computing (2004).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-b5a73982-36dd-4dd5-aec2-acc2c68710d8
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.