Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless Networks

  • Lim, Sun-Hee (Graduate School of Information Management and Security, CIST, Korea University) ;
  • Yun, Seung-Hwan (Graduate School of Information Management and Security, CIST, Korea University) ;
  • Lim, Jong-In (Graduate School of Information Management and Security, CIST, Korea University) ;
  • Yi, Ok-Yeon (Department of Mathematics, Kookmin University)
  • 발행 : 2009.12.31

초록

A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical crosslayer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.

키워드

참고문헌

  1. IEEE Std 802.11i-2004, IEEE Standard for information technology Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 6: Medium Access Control (MAC) Security Enhancements, 2004
  2. IEEE Std 802.1x-2004, Port-Based Network Access Control, 2004. A. K. Agarwal, W. Wang, and J. Y. McNair, "An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks," in Proc. IEEE Globecom, St. Louis, USA, Nov. 2005
  3. IEEE Std 802.16e-2005, IEEE standard for local and metropolitan area networks, part 16: air interface for fixed broadband wireless access systems, amendment 2: physical and medium access control layers for combined fixed and mobile operation in licensed bands, Feb. 2006
  4. 3GPP TS 33.102, 3rd Generation Partnership Project; Technical Specification Group Services and Systems Aspects; 3G Security; Security Architecture (Release 6), Tech. Spec. 3GPP TS 33.102 V6.3.0, 2004
  5. 3GPP TS 21.133, 3rd Generation Partnership Project; Technical Specification Group Services and Systems Aspects; 3G Security; Security Threats and Requirements (Release 4), Tech. Spec. 3GPP TS 21.133 V4.1.0, 2001
  6. A. K. Agarwal and W. Wang, "On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility,” Mob. Netw. Appl., vol. 12, no. 1, pp. 93–110, 2007. C. S. Ong, K. Nahrstedt, andW. Yuan, “Quality of Protection for Mobile Multimedia Applications," in Proc. ICME, vol. 2, July 2003, pp. 137–140
  7. S. Aissi, N. Dabbous, and A. R. Prasad, Security for Mobile Networks and Platforms, Artech House, 2006
  8. IEEE Std 802.11-1999 Edition, IEEE Standard for information technology Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, 1999
  9. A. Mishra and W. A. Arbaugh, An Initial Analysis of the IEEE 802.1X Standard, University of Maryland, pp. 1–22, 2002
  10. IEEE Std 802.11-2007, IEEE Standard for information technology Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, 2007
  11. D. Johnston and J. Walker, Overview of IEEE 802.16 Security, IEEE Security &Privacy, 2004
  12. IEEE Std 802.16-2004, IEEE standard for local and metropolitan area networks, Part 16: air interface for fixed broadband wireless access systems, Oct. 2004
  13. S.-H. Lim, O. Yi, A study on EAP-AKA authentication architecture for WiBro wireless network, KICS2005-11-457
  14. B. Potter, Wireless Security’s Future, IEEE Security & Privacy, 2003
  15. RFC 5216, The EAP-TLS Authentication Protocol, Network Working Request for Comments : 5216, 2008
  16. D. R. Stinson, Cryphtography Theory and Practice, 2nd ed. Chapman& Hall/CRC, pp. 95–108, 2002
  17. RFC 3748, Extensible Authentication Protocol (EAP), Network Working Request for Comments : 3748, 2004
  18. RFC 4187, Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA), Network Working Request for Comments : 4187, 2006