Browse > Article
http://dx.doi.org/10.6109/jkiice.2013.17.6.1348

Design of Integrated Security Framework for Open Wireless Networking Architecture  

Kim, Jung Tae (목원대학교)
Abstract
The increasing demand of users for various wireless communication services has lead to the development with uniting co-existence of different and wireless networks. Each one of the these wireless networks has its own unique characteristics, as compared to other networks. An integrated security mechanism is one of the key issue in the open wireless network. To realize overall security mechanism in open wireless architecture, we should provide practical workable framework for the realization of the integrated security challenges. In this paper, we analysed integrated security platform and considerations based on the security concept.
Keywords
Security Frame Architecture; Wireless Networking; RFID; Integrated Security Mechanism;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, 2007, pp.337-340.   DOI   ScienceOn
2 A. Juels, "RFID Security and Privacy: A research survey", Selected Areas in Communications, IEEE Journal, pp.104-112, 2006
3 Faouzi Kamoun, "RFID System Management: State-of-the Art and Open Research Issues", IEEE Transaction on Network and Service Management, vol.6, no.3, Sep, p.190-1205, 2009   DOI   ScienceOn
4 A. Bongdanov, etal, " Hash Functions and RFID Tags: Mind the Gap," Proc. of the CHES08, vol. 5154 of LNCS, p.283-299, 2008
5 M. Feldhofer, etal, "Strong Authentication for RFID Systems Using the AES Algorithm," Proc. of the CHES04, vol.3156, p.85-140, 2004
6 Di Ma and Gene Tsudik, "Security and Privacy in Emerging Wireless Networks", IEEE Wireless Communication, Oct 2011, pp.12-21
7 Lenka Lhotska, "Security Recommendation for Implementation in Distributed Healthcare System", ICCST 2008, pp76-83
8 Ming Li, etc, "Data Security and Privacy in Wireless Body Area Networks", IEEE Wireless Communication, 2010, pp.51-58
9 Jelena Misic, "Enforcing Patient Privacy in Healthcare WSAs Using ECC Implemented on 802.15.4 Beacon Enabled Clusters", 6th Annual IEEE International Conference on Pervasive Computing and Communications", 2008, pp.686-690
10 Jung Tae Kim, "Privacy and Security Model for RFID Healthcare System in Wireless Communication Network", vol.16, no.6, 2012, pp.1223-1128   과학기술학회마을   DOI   ScienceOn
11 Hai Liu, etc, "Taxonomy and Challenges of the Integration of RFID and Wireless Sensor Networks", IEEE Network, 2008, pp.26-32
12 Faouzi Kamoun. "RFID System Management: State-of-the Art and Open Research Issues" IEEE Transactions on Network and Service Management, vol.6, no. 3, pp.190-205, Sep. 2009   DOI   ScienceOn
13 George Poulopoulos, Konstantinos Markantonakis, Keith Mayes, "A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems", pp.706-p.711, 2009 International Conference on Availability, Reliability and Security
14 S.A.Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Comp., volume 2802 of LNCS, pages 201-212, 2004.