Performance Evaluation of End-to-End Security Protocols in WiBro using NS-2 |
Kim, Jung-Yoon
(성균관대학교 정보통신공학부)
Song, Se-Hwa (성균관대학교 정보통신공학부) Kim, In-Hwan (성균관대학교 정보통신공학부) Hwang, In-Yong (삼성탈레스 종합연구소) Kim, Seok-Joong (삼성탈레스 종합연구소) Choi, Hyoung-Kee (성균관대학교 정보통신공학부) |
1 | IEEE 802.11-2007, "IEEE standard for Information technology Telecommunications and information exchange between systems- Local and metropolitan area networks - Specific requirements Part 11 Wireless LAN Meidum Access Control (MAC) and Physical Layer (PHY) Specifications," June 2007 |
2 | Telecommunications Technology Association (TTA),'TTA Standard for Wireless Broadband (WiBro) Portable Internet: Specifications for 2.3 GHz band Portable Internet - PHY and MAC layers," 2004 |
3 | The Network Simulator - NS-2, available at http//www.isi.edu/nsnamlns/ |
4 | H. Junbeom, S. Hyeongseop, K. Pyung, Y. Hyunsoo, and S. Nah-Oak, "Security Consider- ations for Handover Schemes in Mobile Wi:VIAX Networks," WCNC 2008, pp. 2531-2536 |
5 | J Arkko and H. Haverinen, "Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)," RFC 4187, January 2006 |
6 | Alan O. Freier, Philip Karlton, and Paul C. Kocher, "The SSL Protocol Version 3.0," available at http:;/wp.netscape.com/eng/ssI3/ssl-toc.html |
7 | IEEE 802.16e/D5-2004, "Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems - Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands," November 2004 |
8 | T. Dierks and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2," RFC 5246, August 2008 |
9 | S. Kent and R Atkinson, "Security Architecture for the Internet Protocol," RFC 2401, November 1998 |
10 | A. Alshamsi and T. Saito, "A technical comparison of IPSec and SSL," AINA 2005, pp. 395-398 |
11 | NIST, "IEEE 802.16 ns-2 code," available at http:// www.antd.nist.gov/seamlessandsecure/doc.html |
12 | E. Hescorla and N. Modadugu, "Datagram transport layer security," RFC 4347, April 2006 |
13 | S. Hung-Min, L. Yue-Hsun, C. Shuai-Min, and S. Yi-Chung, "Secure and fast handover scheme based on pre-authentication method for 802.16/ WiMAX infrastructure networks," TEN CON 2007, pp. 1-4 |
14 | S. Ya-Chin and L. Yi~Bing, "IPsec~Based VoIP Performance in WLAN Environments," IEEE Internet Computing, Vol.12, No.6, pp. 77-82, 2008 DOI |
15 | N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Transactions on Mobile Computing, Vol.5, No.2, pp. 128-143, 2006 DOI ScienceOn |
16 | 3GPP, 3rd generation partnership project; Technical specification group services and systems aspects, "IP Multimedia subsystem stage 2, Tech. Spec. 3G TS 23.228 version 6.2.0 (2003-06)," 2003 |
17 | Sun-Hwa Lim and Sang-ho Lee, "Efficient IMS Authentication Architecture based on Initial Access Authentication in Willro-Evolution (WiBro-EVO) System," VTC 2007, pp. 904-908 |
18 | 3GPP; Technical Specification Group Services and System Aspects, "UMTS Access Stratum Services and Functions, version 7.0.0, release 7," June 2007 |