Security and Handover Designs for VoWLAN System

  • Mi-Yeon Kim
  • Misook Lim
  • Jin-Soo Sohn
  • Dong Hoon Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4773)

Abstract

There is a growing interest for VoWLAN (Voice over Wireless LAN) services in the advent of network convergence and user mobility. As we design a VoWLAN system capable of handling both intra- and inter-handover real-time data, we should likewise consider its security architecture as compared to WLAN (Wireless LAN) systems. In this paper, we propose a method for VoWLAN that would provide handover and security standards designed to enhance and speed up the authentication process while handover.

Keywords

VoWLAN Security Handover 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wang, W., Liew, S., Li, V.O.K.: Solution to Performance Problems in VoIP Over 802.11 Wireless LAN. IEEE Transactions on Vehicular technology 54(1), 366–384 (2005)CrossRefGoogle Scholar
  2. 2.
    Chen, J.-C., Jiang, M.-C., Liu, Y.-w.: Wireless LAN security and IEEE 802.11i. IEEE Wireless Communications 12(1), 27–36 (2005)CrossRefGoogle Scholar
  3. 3.
    Brown, B.: 802.11: the security differences between b and i. IEEE Potentials 22(4), 23–27 (2003)CrossRefGoogle Scholar
  4. 4.
    IEEE std 802.11i, Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; Amendment 6: Medium Access Control (MAC) Security Enhancements (July 2004)Google Scholar
  5. 5.
    IEEE std 802.1X. Port-Based Network Access Control (December 2004)Google Scholar
  6. 6.
    Funk, P., Blake-Wilson, S.: EAP Tunneled TLS Authentication Protocol (EAP-TTLS), IETF Internet draft, draft-ietf-pppext-eap-ttls-05.txt (work in progress)Google Scholar
  7. 7.
    Borse, M., Shinde, H.: Wireless security & privacy. In: IEEE International Conference on Personal Wireless Communications, pp. 424–428. IEEE Computer Society Press, Los Alamitos (2005)CrossRefGoogle Scholar
  8. 8.
    Kang, Yu-Sung, et al.: WLAN Security standard 802.11i. TTA Journal No 99, 123–129 (2005)Google Scholar
  9. 9.
    Rosenberg, J., et al.: SIP: Session Initiation Protocol. IETF RFC 3261, (June 2002)Google Scholar
  10. 10.
    Steffen, A., et al.: SIP Security, DFN-Arbeitstagung ber Kommunikationsnetze, pp. 397–412 (2004)Google Scholar
  11. 11.
    Ramsdell B.: S/MIME Version 3 Message Specification. IETF RFC 2633 (1999) Google Scholar
  12. 12.
    Baugher M., et al.: The Secure Real-time Transport Protocol (SRTP), IETF RFC 3711 (March 2004)Google Scholar
  13. 13.
    Sharma, S., Zhu, N., Chiueh, T.-c.: Low-latency mobile IP handoff for infrastructure-mode wireless LANs. IEEE Journal on Selected Areas in Communications 22(4), 643–652 (2004)CrossRefGoogle Scholar
  14. 14.
    IEEE Std 802.1Q, Virtual bridged local area networks (May 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Mi-Yeon Kim
    • 1
  • Misook Lim
    • 1
  • Jin-Soo Sohn
    • 1
  • Dong Hoon Lee
    • 2
  1. 1.Service Development Department, Infra Laboratory, Korea Telecom 
  2. 2.Center for Information Security Technologies (CIST), Korea University 

Personalised recommendations