Abstract
Mobile networking generates new transmission problems that do not occur in classical point-to-point communications. For example, in multi-user wireless network multiple users share a common spectrum. Smart receivers are used to extract multiple information streems efficiently. There are many issues that overlap signal processing and networking, especially on wireless access links where it is difficult to achieve high subjective quality and traffic capability. In this paper the design of wireless data security architecture in secure electronic transactions and WLAN. INTEL WLAN Pilot determined VPNs offer the best security at the moment. Future versions of 802.11 will use encryption to achieve high subjective quality on low-reliability wireless links without requiring VPNs. Both Universal Mobile Telecommunication System (3GPP) and CDMA2000 (3GPP2) wireless security architectures are addressed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
3rd Generation Partnership Project, Technical Specification GroupTerminals; Guide to 3rd Generation Security (V.1.2.0), TR 33.900, ftp://ftp.3gpp.org/specs/archive/33_series/33.900/33900-120.zip .
3rd Generation Partnership Project 2, Enhanced Security Servives (v.1), PN-4393 TIA/EIA-41, ftp://ftp.3gpp2.org.
3rd Generation Partnership Project, Technical Specification GroupTerminals; 3G Security; Cryptographic Algorithm Requirements, TS 33.105 V3.8.0, June 2001, http://www.3gpp.org/ftp/tsg%5Fsa/wg3%5Fsecurity/%5Fspecs/33105%2DD380.pdf .
MeT, which defines a technical framework for secure electronic transactions from a mobile phone, ensuring consistent user experience. Its members include all major handset manufacturers (Panasonic, Siemens and Sony), security companies, the financial sector, and operators. http://www.mobiletransaction.org .
Mobey Forum, which is driven by the financial industry, is to encourage the use of mobile technology in financial services, such as payments, and remote banking and stock trading. Its members include Nokia, Ericsson, and VISA International. http://www.mobeyforum.org .
GMCIG, which is an open and global organization that develops and submitts secure wireless standards to existing standard organizations. Its members include Eurocard International, Deutsche Postbank, and Motorola. http://www.gmcig.org .
RADICCHIO, which is to reach a consensus for secure m-commerce in interoperability issues. Its members include Siemens, Ericsson, and Mastercard. http://www.radicchio.org .
WAP ECOMEG, which is a WAP FORUM focusing on all issues relating to e-commerse. http://www.ecomeg.org .
Telenor and Ericsson: Wireless LAN as a complementary GPRS access technology. White paper, 2001.
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, ISO/IEC 8802-11: 1997(E), 1997/IEEE 802.11, 1997.
C. Rigney et al.: Remote Authentication Dial in User Service (RADIUS), RFC 2865.
M. WAHL et al: Lightweight Directory Access Protocol (v3), RFC 2251.
INTEL E-business Group, Wireless LAN, White Paper, December 2002.
HIPERLAN/2 Global Forum: http://www.hiperlan2.com .
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, High Speed Physical Layer in the 5 GHz Band, ISO/IEC 8802-11: 2000(E), 2000.
3rd Generation Partnership Project 2, IP Network Architecture Model for CDMA2000 Spread Spectrum Systems, S.R0032-0 v2.0, May 2002, http://www.3gpp2.org/Public_html/specs/S.R0032-0_v.2.0.doc.pdf .
C. Perkins: IP Mobility Support, RFC 3220, IETF, January 2002. http://www.ietf.org/rfc/rfc3220.txt .
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vincze, S. (2003). How Secure Personal Mobility Can Be?. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds) Computational Science and Its Applications — ICCSA 2003. ICCSA 2003. Lecture Notes in Computer Science, vol 2667. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44839-X_26
Download citation
DOI: https://doi.org/10.1007/3-540-44839-X_26
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40155-1
Online ISBN: 978-3-540-44839-6
eBook Packages: Springer Book Archive