SECURITY MODELS FOR HETEROGENEOUS NETWORKING

Glenford Mapp, Mahdi Aiash, Aboubaker Lasebae, Raphael Phan

2010

Abstract

Security for Next Generation Networks (NGN) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address the security challenges in 4G networks. This paper sheds light on our approach of providing security for the Y-Comm architecture as an example of 4G communication frameworks. Our approach proposes a four-layer security integrated module to protect data and three targeted security models to protect different network entities, thus providing security in different situations without affecting the dynamics of the 4G networks.

References

  1. Saltzer, J. H. Reed, D., & Clark, D. D., 1984. End-to-end arguments in system design. In ACM Transactions in Computing Systems, p. 277-288.
  2. McNair, J., Zhu, F., 2004. Vertical Handoffs in FourthGeneration Multinetwork Environments. In IEEE Wireless Communications, vol. 11,.
  3. Duda, A., Sreenan, C., 2003. Challenges for Quality of Service in Next-Generation Mobile Networks. In Proceedings of IT &T Annual Conference, October 2003.
  4. Mapp, G., Cottingham, D., Shaikh , F., Vidales, P., Patanapongpibul, L., Baliosian ,J. & Crowcroft, J., 2006. An Architectural Framework for Heterogeneous Networking. In Proceedings of the International Conference on Wireless Information Networks and Systems (WINSYS 2006). August 2006, p.5-10.
  5. Mapp, G., Shaikh, F., Crowcroft, J., Cottingham, D., Beliosian, J., 2007. Y-Comm: A Global Architecture for Heterogeneous Networking, (Invited Paper). In the 3rd Annual International Wireless Internet Conference (WICON 2007). Austin, Texas, USA, October 22-24, 2007.
  6. Irvine, C., Levin, T., 2000. Quality of Security Service. In Proceedings of the New Security Paradigms Workshop, September 2000.
  7. Ballani, H., Chawathe, Y., Ratnasamy, S., Roscoe, T. & Shenker, S., 2005. Off by Default!. In Proceedings of the Fourth Workshop on Hot Topics in Networking (HotNets-II), College Park, MD, USA, November 2005.
  8. Aiash, M., Mapp, G., Lasebae, A. & Phan, R., 2010. Providing Security in 4G Systems: Unveiling the Challenges. In The Sixth Advanced International Conference on Telecommunications, AICT 2010. Barcelona, Spain, 9-15 May 2010. [Accepted paper].
Download


Paper Citation


in Harvard Style

Mapp G., Aiash M., Lasebae A. and Phan R. (2010). SECURITY MODELS FOR HETEROGENEOUS NETWORKING . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 318-321. DOI: 10.5220/0003032803180321


in Bibtex Style

@conference{secrypt10,
author={Glenford Mapp and Mahdi Aiash and Aboubaker Lasebae and Raphael Phan},
title={SECURITY MODELS FOR HETEROGENEOUS NETWORKING},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={318-321},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003032803180321},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - SECURITY MODELS FOR HETEROGENEOUS NETWORKING
SN - 978-989-8425-18-8
AU - Mapp G.
AU - Aiash M.
AU - Lasebae A.
AU - Phan R.
PY - 2010
SP - 318
EP - 321
DO - 10.5220/0003032803180321