Abstract
Security in the wireless access network gained increasing interest over the last years. Its implementation varies from one access network to another. The current trend in wireless access network is towards implementing mechanisms for mobility management namely handoff process and quality of service control. Consequently, security should be taken into consideration at each handoff process which may occur between different technologies (intertechnology) or within the same (intra-technology). At the same time, security provisioning impact on network performances (e.g. end-to-end delay, throughput) should be controlled. This chapter aims to give a better understanding of security measures and protocols available in two distinct wireless network families, namely the Wireless Wide Area Network (WWAN) and the Wireless Local Area Network (WLAN). WWAN family includes the wide coverage area technologies such as the Long-term Evolution (LTE), also named as Evolved Packet System (EPS). On the other hand, WLAN are characterized by having a small coverage area. It includes the WiFi (802.11) technology. Each time, the chapter highlights the mechanisms employed by access network to ensure the trade-off between secured mobility and application requirements in terms of delay and throughput.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
3GPP TS 23.401 (v10.3.0), General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access (release March 10, 2011)
IEEE 802.11, Number Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specific Requirements, IEEE Std. 802.11-1997
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 8: Fast BSS Transition, IEEE std., 802.11r
Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for enhanced security, IEEE Std. 802.11i-2004
Komarova, M., Riguidel, M.: Secure User’s Mobility: the current situation. China Communication Journal. Special Issue on Wireless Communications 4(1), 95–104 (2007)
3GPP TS 24.302 (v10.2.0), Access to the 3GPP Evolved Packet Core (EPC) via non-3GPP access networks (release December 10, 2010)
Stallings, W.: Network security essentials, 4th edn. Pearson Education (2011) ISBN: 978-0-13-706792-3
Shirey, R.: Internet Security Glossary, Version 2. IETF RFC 4949 (Informational) (August 2007)
3GPP TR 33.821 (v9.0.0), Rationale and track of security decisions in Long Term Evolved (LTE) RAN / 3GPP System Architecture Evolution (SAE) (release June 9, 2009)
3GPP TS 33.401 (v11.0.0), “3GPP System Architecture Evolution (SAE); Security architecture”, (release June 11, 2011)
3GPP TS 29.272 (v11.0.0), “Evolved Packet System (EPS); Mobility Management Entity (MME) and Serving GPRS Support Node (SGSN) related interfaces based on Diameter protocol,” (release September 11, 2011)
Hu, Y.-Z., Ma, D.-W., Li, X.-F.: An Improved Authentication Protocol with Less Delay for UMTS Mobile Networks. In: International Conference on Networking and Digital Society, ICNDS 2009 (2009)
Lin, Y.-B., Chen, Y.-K.: Reducing Authentication Signaling Traffic in Third-Generation mobile Network. IEEE Transactions on Wireless Communications 2(3) (May 2003)
Al-Saraireh, J., Yousef, S.: Analytical model for authentication transmission overhead between entities in mobile networks. Computer Communications 30, 1713–1720 (2007)
http://www.trainingcamp.com/usa/preclass/ceh/Reading/WEP.pdf
Bulbul, H.I., Batmaz, I., Ozel, M.: Wireless Network Security: Comparison of WEP (Wired Equivalent Privacy) Mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) Security Protocols. In: Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, e-Forensics 2008 (2008)
Institute of Electrical and Electronics Engineer, “IEEE standards for Local and Metropolitan Area Networks: Port-based Network Access Control”, IEEE Std. 802.1X-2004
http://www.interlinknetworks.com/whitepapers/WLAN_Access_Control.pdf
Fathi, H., et al.: On the impact of security on the latency in WLAN 802.11b. IEEE Globecom (2005)
Boulmalf, M., Barka, E., Lakas, A.: Analysis of the effect of security on data and voice traffic in WLAN. Computer Communications 30, 2468–2477 (2007)
Marin-Lopez, R., Ohba, Y., Pereniguez, F., Gomez, A.F.: Analysis of Handover Key Management schemes under IETF perspective. Computer Standards & Interfaces 32(5-6), 266–273 (2010) ISSN 0920-5489
Bargh, M.S., et al.: Fast Authentication Methods for handovers between IEEE 802.11 Wireless LANs. In: ACM WMASH 2004 (October 2004)
Liang, W., Wang, W.: On performance analysis of challenge/response based authentication in wireless networks. Computer Network 48(2), 267–288 (2005)
Georgiades, M., Akther, N., Politis, C., Tafazolli, R.: Enhancing mobility management protocols to minimize AAA impact on handoff performance. Science Direct Computer Communication 30, 608–618 (2007)
Housley, R., Aboda, B.: Guidance for authentication, Authorization, and Accounting (AAA) key management. IETF RFC 4962 (July 2007)
Lopez, R.M., Dutta, A., Ohba, Y., Schulzrinne, H., Skarmeta, A.F.G.: Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks. In: Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous 2007, pp. 1–8 (August 2007)
Mishra, A., Shin, M., Petroni, N., Clancy, C., Arbaugh, W.: Proactive key distribution using neighbor graphs. IEEE Wireless Communications 11, 29–36 (2004)
3GPP TS 33.234 (11.3.0), 3G security; Wireless Local Area Network (WLAN) interworking security (release March 11, 2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Said, S.B.H., Guillouard, K., Bonnin, JM. (2013). A Comparative Study on Security Implementation in EPS/LTE and WLAN/802.11. In: Khan, S., Khan Pathan, AS. (eds) Wireless Networks and Security. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36169-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-36169-2_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36168-5
Online ISBN: 978-3-642-36169-2
eBook Packages: EngineeringEngineering (R0)