Skip to main content

Elastic Security QoS Provisioning for Telematics Applications

  • Conference paper
Information Security Applications (WISA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3786))

Included in the following conference series:

Abstract

In the vision of 4G networks there is a strong demand for universal wireless access and ubiquitous computing through consistent personal and terminal mobility supports. The ability to provide seamless and adaptive QoS guarantees is key to the success of 4G systems. This paper proposes the novel concept of the elastic security QoS provisioning and the autonomous context transfer scheme in the future wireless networks, taking into account the specific requirements for highly dynamic vehicular users. We designed Mobile Manager that can make the autonomous and user transparent decision for the context-aware secure handover. To demonstrate the effectiveness of the proposed security mechanism, we also analyze the performance of our handover scheme by using the multi-class queuing network model. Our scheme can obtain the performance improvement of seamless security services and can be used as an intelligent add-on model to existing networking systems like mobile networks for telematics applications and home networks for efficient mobility-aware applications.

This research was supported by the MIC(Ministry of Information and Communication), Korea, under the Chung-Ang University HNRC(Home Network Research Center)-ITRC support program supervised by the IITA(Institute of Information Technology Assessment).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McNair, J., Zhu, F.: Vertical handoffs in fourth-generation multinetwork environments. IEEE Wireless Communications 11(3), 8–15 (2004)

    Article  Google Scholar 

  2. Gao, X., Wu, G., Miki, T.: End-to-end QoS provisioning in mobile heterogeneous networks. IEEE Wireless Communications 11(3), 24–34 (2004)

    Article  Google Scholar 

  3. Loughney, J.: Context Transfer Protocol. Seamoby Working Group, Internet Engineering Task Force, draft-ietf-seamoby-ctp-11.txt

    Google Scholar 

  4. Politis, C., Chew, K.A., Akhtar, N., Georgiades, M., Tafazolli, R.: Hybrid Multilayer mobility management with AAA context transfer capabilities for All-IP networks. IEEE Wireless Communications (August 2004)

    Google Scholar 

  5. Kempf, J.: Problem Description: Reasons For Performing Context Transfers Between Nodes in an IP Access Network. RFC 3374, Internet Engineering Task Force

    Google Scholar 

  6. Roi, A., Das, S.K.: Exploiting Information Theory for adaptive mobility and Resource Management in future cellular networks. IEEE Wireless Communications (August 2004)

    Google Scholar 

  7. Liu, G., Maguire Jr., G.: A Class of Mobile Motion Prediction Algorithms for Wireless Mobile Computing and Communications. ACM/Baltzer MONET 1(2), 113–121 (1996)

    Google Scholar 

  8. Liu, T., Bahl, P., Chlamtac, I.: Mobility Modeling, Location Tracking and Trajectory Prediction in Wireless ATM Networks. IEEE Selected Areas in Communications 16(16), 922–936 (1998)

    Google Scholar 

  9. Soh, W.-S., Kim, H.S.: Dynamic Bandwidth Reservation in Cellular Networks Using Road Topology Based Mobility Predictions. In: Proc. IEEE INFOCOM 2004 (March 2004)

    Google Scholar 

  10. Lam, K.-Y., et al.: On Using Handoff Statistics and Velocity for Location Management in Cellular Wireless Networks. Computer Journal 48(1), 84–100 (2005)

    Article  Google Scholar 

  11. Ruckforth, T., Linder, J.: AAA Context Transfer for Fast Authenticated Inter-domain Handover. Swisscom SA (March 2004)

    Google Scholar 

  12. Oyoqui, J.M., Garcia-Macias, J.A.: Context transfer for seamless micro-mobility. In: IEEE ENC 2003 (2003)

    Google Scholar 

  13. Hubaux, J.P., et al.: The security and privacy of smart vehicles. IEEE Security & Privacy Magazine 2(3), 49–55 (2004)

    Article  Google Scholar 

  14. John, B.R.H.: Performance of Computer Communication Systems: A Model-Based Approach. Wiley & Sons, Chichester (1999)

    Google Scholar 

  15. Bolch, G., Greiner, S., Trevedi, K.: A Generalized Analysis technique for queueing networks with mixed priority strategy and class switching. Technical Report TR-I4-95-08 (October 1995)

    Google Scholar 

  16. OpenSSL, http://www.openssl.org

  17. Bhargavan, V., Jayanth, M.: Profile-based Next-cell Prediction in Indoor Wireless LAN. In: Proc. IEEE SICON 1997 (April 1997)

    Google Scholar 

  18. Lee, M., Kim, J., Park, S., Song, O., Jun, S.: A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 394–406. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  19. Lee, M., Kim, G., Park, S.: Seamless and Secure Mobility Management with Location Aware Service (LAS) Broker for Future Mobile Interworking Networks. Journal of Communications and Networks 7(2), 207–221 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, M., Park, S., Song, O. (2006). Elastic Security QoS Provisioning for Telematics Applications. In: Song, JS., Kwon, T., Yung, M. (eds) Information Security Applications. WISA 2005. Lecture Notes in Computer Science, vol 3786. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11604938_10

Download citation

  • DOI: https://doi.org/10.1007/11604938_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31012-9

  • Online ISBN: 978-3-540-33153-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics