loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Glenford Mapp 1 ; Mahdi Aiash 1 ; Aboubaker Lasebae 1 and Raphael Phan 2

Affiliations: 1 Middlesex University, United Kingdom ; 2 Loughborough University, United Kingdom

ISBN: 978-989-8425-18-8

Keyword(s): Heterogeneous networks, Security models, Integrated security module, Open network, Multi-layer.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Mobile System Security ; Network Security ; Ubiquitous Computing Security ; Wireless Network Security

Abstract: Security for Next Generation Networks (NGN) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address the security challenges in 4G networks. This paper sheds light on our approach of providing security for the Y-Comm architecture as an example of 4G communication frameworks. Our approach proposes a four-layer security integrated module to protect data and three targeted security models to protect different network entities, thus providing security in different situations without affecting the dynamics of the 4G networks.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.238.192.150

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Mapp G.; Aiash M.; Lasebae A.; Phan R. and (2010). SECURITY MODELS FOR HETEROGENEOUS NETWORKING.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 318-321. DOI: 10.5220/0003032803180321

@conference{secrypt10,
author={Glenford Mapp and Mahdi Aiash and Aboubaker Lasebae and Raphael Phan},
title={SECURITY MODELS FOR HETEROGENEOUS NETWORKING},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={318-321},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003032803180321},
isbn={978-989-8425-18-8},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - SECURITY MODELS FOR HETEROGENEOUS NETWORKING
SN - 978-989-8425-18-8
AU - Mapp, G.
AU - Aiash, M.
AU - Lasebae, A.
AU - Phan, R.
PY - 2010
SP - 318
EP - 321
DO - 10.5220/0003032803180321

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.