Browse > Article

Performance Evaluation of End-to-End Security Protocols in WiBro using NS-2  

Kim, Jung-Yoon (성균관대학교 정보통신공학부)
Song, Se-Hwa (성균관대학교 정보통신공학부)
Kim, In-Hwan (성균관대학교 정보통신공학부)
Hwang, In-Yong (삼성탈레스 종합연구소)
Kim, Seok-Joong (삼성탈레스 종합연구소)
Choi, Hyoung-Kee (성균관대학교 정보통신공학부)
Abstract
WiBro has advantages when both WLAN and 3G UMTS are adopted. Much research is being carried out in this area. However, the WiBro specification does not consider end-to-end security. Hence, another security protocol has to be adopted to support secure communication. Most previous research only focused on WiBro MAC performance improvement or security. In this paper, we adopt a security protocol such as IPsec, TLS, and DTLS, well known end-to-end security protocols, to make full use of WiBro in the IP network. Using NS-2 we simulated the adoption of end-to-end security protocol and evaluated performance and usability. Simulation shows DTLS had some performance advantages. All the protocols, TLS and IPsec are also suitable for use in WiBro.
Keywords
WiBro; security protocol; performance evaluation; network security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 IEEE 802.11-2007, "IEEE standard for Information technology Telecommunications and information exchange between systems- Local and metropolitan area networks - Specific requirements Part 11 Wireless LAN Meidum Access Control (MAC) and Physical Layer (PHY) Specifications," June 2007
2 Telecommunications Technology Association (TTA),'TTA Standard for Wireless Broadband (WiBro) Portable Internet: Specifications for 2.3 GHz band Portable Internet - PHY and MAC layers," 2004
3 The Network Simulator - NS-2, available at http//www.isi.edu/nsnamlns/
4 H. Junbeom, S. Hyeongseop, K. Pyung, Y. Hyunsoo, and S. Nah-Oak, "Security Consider- ations for Handover Schemes in Mobile Wi:VIAX Networks," WCNC 2008, pp. 2531-2536
5 J Arkko and H. Haverinen, "Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)," RFC 4187, January 2006
6 Alan O. Freier, Philip Karlton, and Paul C. Kocher, "The SSL Protocol Version 3.0," available at http:;/wp.netscape.com/eng/ssI3/ssl-toc.html
7 IEEE 802.16e/D5-2004, "Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems - Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands," November 2004
8 T. Dierks and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2," RFC 5246, August 2008
9 S. Kent and R Atkinson, "Security Architecture for the Internet Protocol," RFC 2401, November 1998
10 A. Alshamsi and T. Saito, "A technical comparison of IPSec and SSL," AINA 2005, pp. 395-398
11 NIST, "IEEE 802.16 ns-2 code," available at http:// www.antd.nist.gov/seamlessandsecure/doc.html
12 E. Hescorla and N. Modadugu, "Datagram transport layer security," RFC 4347, April 2006
13 S. Hung-Min, L. Yue-Hsun, C. Shuai-Min, and S. Yi-Chung, "Secure and fast handover scheme based on pre-authentication method for 802.16/ WiMAX infrastructure networks," TEN CON 2007, pp. 1-4
14 S. Ya-Chin and L. Yi~Bing, "IPsec~Based VoIP Performance in WLAN Environments," IEEE Internet Computing, Vol.12, No.6, pp. 77-82, 2008   DOI
15 N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Transactions on Mobile Computing, Vol.5, No.2, pp. 128-143, 2006   DOI   ScienceOn
16 3GPP, 3rd generation partnership project; Technical specification group services and systems aspects, "IP Multimedia subsystem stage 2, Tech. Spec. 3G TS 23.228 version 6.2.0 (2003-06)," 2003
17 Sun-Hwa Lim and Sang-ho Lee, "Efficient IMS Authentication Architecture based on Initial Access Authentication in Willro-Evolution (WiBro-EVO) System," VTC 2007, pp. 904-908
18 3GPP; Technical Specification Group Services and System Aspects, "UMTS Access Stratum Services and Functions, version 7.0.0, release 7," June 2007