APNOMS 2007: Managing Next Generation Networks and Services pp 447-456 | Cite as
Security and Handover Designs for VoWLAN System
Conference paper
Abstract
There is a growing interest for VoWLAN (Voice over Wireless LAN) services in the advent of network convergence and user mobility. As we design a VoWLAN system capable of handling both intra- and inter-handover real-time data, we should likewise consider its security architecture as compared to WLAN (Wireless LAN) systems. In this paper, we propose a method for VoWLAN that would provide handover and security standards designed to enhance and speed up the authentication process while handover.
Keywords
VoWLAN Security HandoverPreview
Unable to display preview. Download preview PDF.
References
- 1.Wang, W., Liew, S., Li, V.O.K.: Solution to Performance Problems in VoIP Over 802.11 Wireless LAN. IEEE Transactions on Vehicular technology 54(1), 366–384 (2005)CrossRefGoogle Scholar
- 2.Chen, J.-C., Jiang, M.-C., Liu, Y.-w.: Wireless LAN security and IEEE 802.11i. IEEE Wireless Communications 12(1), 27–36 (2005)CrossRefGoogle Scholar
- 3.Brown, B.: 802.11: the security differences between b and i. IEEE Potentials 22(4), 23–27 (2003)CrossRefGoogle Scholar
- 4.IEEE std 802.11i, Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; Amendment 6: Medium Access Control (MAC) Security Enhancements (July 2004)Google Scholar
- 5.IEEE std 802.1X. Port-Based Network Access Control (December 2004)Google Scholar
- 6.Funk, P., Blake-Wilson, S.: EAP Tunneled TLS Authentication Protocol (EAP-TTLS), IETF Internet draft, draft-ietf-pppext-eap-ttls-05.txt (work in progress)Google Scholar
- 7.Borse, M., Shinde, H.: Wireless security & privacy. In: IEEE International Conference on Personal Wireless Communications, pp. 424–428. IEEE Computer Society Press, Los Alamitos (2005)CrossRefGoogle Scholar
- 8.Kang, Yu-Sung, et al.: WLAN Security standard 802.11i. TTA Journal No 99, 123–129 (2005)Google Scholar
- 9.Rosenberg, J., et al.: SIP: Session Initiation Protocol. IETF RFC 3261, (June 2002)Google Scholar
- 10.Steffen, A., et al.: SIP Security, DFN-Arbeitstagung ber Kommunikationsnetze, pp. 397–412 (2004)Google Scholar
- 11.Ramsdell B.: S/MIME Version 3 Message Specification. IETF RFC 2633 (1999) Google Scholar
- 12.Baugher M., et al.: The Secure Real-time Transport Protocol (SRTP), IETF RFC 3711 (March 2004)Google Scholar
- 13.Sharma, S., Zhu, N., Chiueh, T.-c.: Low-latency mobile IP handoff for infrastructure-mode wireless LANs. IEEE Journal on Selected Areas in Communications 22(4), 643–652 (2004)CrossRefGoogle Scholar
- 14.IEEE Std 802.1Q, Virtual bridged local area networks (May 2003)Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2007