Skip to main content

A Comparative Study on Security Implementation in EPS/LTE and WLAN/802.11

  • Chapter

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

Security in the wireless access network gained increasing interest over the last years. Its implementation varies from one access network to another. The current trend in wireless access network is towards implementing mechanisms for mobility management namely handoff process and quality of service control. Consequently, security should be taken into consideration at each handoff process which may occur between different technologies (intertechnology) or within the same (intra-technology). At the same time, security provisioning impact on network performances (e.g. end-to-end delay, throughput) should be controlled. This chapter aims to give a better understanding of security measures and protocols available in two distinct wireless network families, namely the Wireless Wide Area Network (WWAN) and the Wireless Local Area Network (WLAN). WWAN family includes the wide coverage area technologies such as the Long-term Evolution (LTE), also named as Evolved Packet System (EPS). On the other hand, WLAN are characterized by having a small coverage area. It includes the WiFi (802.11) technology. Each time, the chapter highlights the mechanisms employed by access network to ensure the trade-off between secured mobility and application requirements in terms of delay and throughput.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 3GPP TS 23.401 (v10.3.0), General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access (release March 10, 2011)

    Google Scholar 

  2. IEEE 802.11, Number Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specific Requirements, IEEE Std. 802.11-1997

    Google Scholar 

  3. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 8: Fast BSS Transition, IEEE std., 802.11r

    Google Scholar 

  4. Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for enhanced security, IEEE Std. 802.11i-2004

    Google Scholar 

  5. Komarova, M., Riguidel, M.: Secure User’s Mobility: the current situation. China Communication Journal. Special Issue on Wireless Communications 4(1), 95–104 (2007)

    Google Scholar 

  6. 3GPP TS 24.302 (v10.2.0), Access to the 3GPP Evolved Packet Core (EPC) via non-3GPP access networks (release December 10, 2010)

    Google Scholar 

  7. Stallings, W.: Network security essentials, 4th edn. Pearson Education (2011) ISBN: 978-0-13-706792-3

    Google Scholar 

  8. Shirey, R.: Internet Security Glossary, Version 2. IETF RFC 4949 (Informational) (August 2007)

    Google Scholar 

  9. 3GPP TR 33.821 (v9.0.0), Rationale and track of security decisions in Long Term Evolved (LTE) RAN / 3GPP System Architecture Evolution (SAE) (release June 9, 2009)

    Google Scholar 

  10. 3GPP TS 33.401 (v11.0.0), “3GPP System Architecture Evolution (SAE); Security architecture”, (release June 11, 2011)

    Google Scholar 

  11. 3GPP TS 29.272 (v11.0.0), “Evolved Packet System (EPS); Mobility Management Entity (MME) and Serving GPRS Support Node (SGSN) related interfaces based on Diameter protocol,” (release September 11, 2011)

    Google Scholar 

  12. Hu, Y.-Z., Ma, D.-W., Li, X.-F.: An Improved Authentication Protocol with Less Delay for UMTS Mobile Networks. In: International Conference on Networking and Digital Society, ICNDS 2009 (2009)

    Google Scholar 

  13. Lin, Y.-B., Chen, Y.-K.: Reducing Authentication Signaling Traffic in Third-Generation mobile Network. IEEE Transactions on Wireless Communications 2(3) (May 2003)

    Google Scholar 

  14. Al-Saraireh, J., Yousef, S.: Analytical model for authentication transmission overhead between entities in mobile networks. Computer Communications 30, 1713–1720 (2007)

    Article  Google Scholar 

  15. http://www.trainingcamp.com/usa/preclass/ceh/Reading/WEP.pdf

  16. Bulbul, H.I., Batmaz, I., Ozel, M.: Wireless Network Security: Comparison of WEP (Wired Equivalent Privacy) Mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) Security Protocols. In: Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, e-Forensics 2008 (2008)

    Google Scholar 

  17. Institute of Electrical and Electronics Engineer, “IEEE standards for Local and Metropolitan Area Networks: Port-based Network Access Control”, IEEE Std. 802.1X-2004

    Google Scholar 

  18. http://www.interlinknetworks.com/whitepapers/WLAN_Access_Control.pdf

  19. Fathi, H., et al.: On the impact of security on the latency in WLAN 802.11b. IEEE Globecom (2005)

    Google Scholar 

  20. Boulmalf, M., Barka, E., Lakas, A.: Analysis of the effect of security on data and voice traffic in WLAN. Computer Communications 30, 2468–2477 (2007)

    Article  Google Scholar 

  21. Marin-Lopez, R., Ohba, Y., Pereniguez, F., Gomez, A.F.: Analysis of Handover Key Management schemes under IETF perspective. Computer Standards & Interfaces 32(5-6), 266–273 (2010) ISSN 0920-5489

    Article  Google Scholar 

  22. Bargh, M.S., et al.: Fast Authentication Methods for handovers between IEEE 802.11 Wireless LANs. In: ACM WMASH 2004 (October 2004)

    Google Scholar 

  23. Liang, W., Wang, W.: On performance analysis of challenge/response based authentication in wireless networks. Computer Network 48(2), 267–288 (2005)

    Article  MATH  Google Scholar 

  24. Georgiades, M., Akther, N., Politis, C., Tafazolli, R.: Enhancing mobility management protocols to minimize AAA impact on handoff performance. Science Direct Computer Communication 30, 608–618 (2007)

    Article  Google Scholar 

  25. Housley, R., Aboda, B.: Guidance for authentication, Authorization, and Accounting (AAA) key management. IETF RFC 4962 (July 2007)

    Google Scholar 

  26. Lopez, R.M., Dutta, A., Ohba, Y., Schulzrinne, H., Skarmeta, A.F.G.: Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks. In: Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous 2007, pp. 1–8 (August 2007)

    Google Scholar 

  27. Mishra, A., Shin, M., Petroni, N., Clancy, C., Arbaugh, W.: Proactive key distribution using neighbor graphs. IEEE Wireless Communications 11, 29–36 (2004)

    Article  Google Scholar 

  28. 3GPP TS 33.234 (11.3.0), 3G security; Wireless Local Area Network (WLAN) interworking security (release March 11, 2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Siwar Ben Hadj Said .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Said, S.B.H., Guillouard, K., Bonnin, JM. (2013). A Comparative Study on Security Implementation in EPS/LTE and WLAN/802.11. In: Khan, S., Khan Pathan, AS. (eds) Wireless Networks and Security. Signals and Communication Technology. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36169-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36169-2_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36168-5

  • Online ISBN: 978-3-642-36169-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics