Skip to main content

Security and Handover Designs for VoWLAN System

  • Conference paper
Managing Next Generation Networks and Services (APNOMS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4773))

Included in the following conference series:

  • 1036 Accesses

Abstract

There is a growing interest for VoWLAN (Voice over Wireless LAN) services in the advent of network convergence and user mobility. As we design a VoWLAN system capable of handling both intra- and inter-handover real-time data, we should likewise consider its security architecture as compared to WLAN (Wireless LAN) systems. In this paper, we propose a method for VoWLAN that would provide handover and security standards designed to enhance and speed up the authentication process while handover.

“This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement)" (IITA-2006-(C1090-0603-0025)).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, W., Liew, S., Li, V.O.K.: Solution to Performance Problems in VoIP Over 802.11 Wireless LAN. IEEE Transactions on Vehicular technology 54(1), 366–384 (2005)

    Article  Google Scholar 

  2. Chen, J.-C., Jiang, M.-C., Liu, Y.-w.: Wireless LAN security and IEEE 802.11i. IEEE Wireless Communications 12(1), 27–36 (2005)

    Article  Google Scholar 

  3. Brown, B.: 802.11: the security differences between b and i. IEEE Potentials 22(4), 23–27 (2003)

    Article  Google Scholar 

  4. IEEE std 802.11i, Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; Amendment 6: Medium Access Control (MAC) Security Enhancements (July 2004)

    Google Scholar 

  5. IEEE std 802.1X. Port-Based Network Access Control (December 2004)

    Google Scholar 

  6. Funk, P., Blake-Wilson, S.: EAP Tunneled TLS Authentication Protocol (EAP-TTLS), IETF Internet draft, draft-ietf-pppext-eap-ttls-05.txt (work in progress)

    Google Scholar 

  7. Borse, M., Shinde, H.: Wireless security & privacy. In: IEEE International Conference on Personal Wireless Communications, pp. 424–428. IEEE Computer Society Press, Los Alamitos (2005)

    Chapter  Google Scholar 

  8. Kang, Yu-Sung, et al.: WLAN Security standard 802.11i. TTA Journal No 99, 123–129 (2005)

    Google Scholar 

  9. Rosenberg, J., et al.: SIP: Session Initiation Protocol. IETF RFC 3261, (June 2002)

    Google Scholar 

  10. Steffen, A., et al.: SIP Security, DFN-Arbeitstagung ber Kommunikationsnetze, pp. 397–412 (2004)

    Google Scholar 

  11. Ramsdell B.: S/MIME Version 3 Message Specification. IETF RFC 2633 (1999)

    Google Scholar 

  12. Baugher M., et al.: The Secure Real-time Transport Protocol (SRTP), IETF RFC 3711 (March 2004)

    Google Scholar 

  13. Sharma, S., Zhu, N., Chiueh, T.-c.: Low-latency mobile IP handoff for infrastructure-mode wireless LANs. IEEE Journal on Selected Areas in Communications 22(4), 643–652 (2004)

    Article  Google Scholar 

  14. IEEE Std 802.1Q, Virtual bridged local area networks (May 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Shingo Ata Choong Seon Hong

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, MY., Lim, M., Sohn, JS., Lee, D.H. (2007). Security and Handover Designs for VoWLAN System. In: Ata, S., Hong, C.S. (eds) Managing Next Generation Networks and Services. APNOMS 2007. Lecture Notes in Computer Science, vol 4773. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75476-3_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75476-3_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75475-6

  • Online ISBN: 978-3-540-75476-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics