Skip to main content

How Secure Personal Mobility Can Be?

  • Conference paper
  • First Online:
Computational Science and Its Applications — ICCSA 2003 (ICCSA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2667))

Included in the following conference series:

  • 768 Accesses

Abstract

Mobile networking generates new transmission problems that do not occur in classical point-to-point communications. For example, in multi-user wireless network multiple users share a common spectrum. Smart receivers are used to extract multiple information streems efficiently. There are many issues that overlap signal processing and networking, especially on wireless access links where it is difficult to achieve high subjective quality and traffic capability. In this paper the design of wireless data security architecture in secure electronic transactions and WLAN. INTEL WLAN Pilot determined VPNs offer the best security at the moment. Future versions of 802.11 will use encryption to achieve high subjective quality on low-reliability wireless links without requiring VPNs. Both Universal Mobile Telecommunication System (3GPP) and CDMA2000 (3GPP2) wireless security architectures are addressed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 3rd Generation Partnership Project, Technical Specification GroupTerminals; Guide to 3rd Generation Security (V.1.2.0), TR 33.900, ftp://ftp.3gpp.org/specs/archive/33_series/33.900/33900-120.zip .

  2. 3rd Generation Partnership Project 2, Enhanced Security Servives (v.1), PN-4393 TIA/EIA-41, ftp://ftp.3gpp2.org.

  3. 3rd Generation Partnership Project, Technical Specification GroupTerminals; 3G Security; Cryptographic Algorithm Requirements, TS 33.105 V3.8.0, June 2001, http://www.3gpp.org/ftp/tsg%5Fsa/wg3%5Fsecurity/%5Fspecs/33105%2DD380.pdf .

  4. MeT, which defines a technical framework for secure electronic transactions from a mobile phone, ensuring consistent user experience. Its members include all major handset manufacturers (Panasonic, Siemens and Sony), security companies, the financial sector, and operators. http://www.mobiletransaction.org .

  5. Mobey Forum, which is driven by the financial industry, is to encourage the use of mobile technology in financial services, such as payments, and remote banking and stock trading. Its members include Nokia, Ericsson, and VISA International. http://www.mobeyforum.org .

  6. GMCIG, which is an open and global organization that develops and submitts secure wireless standards to existing standard organizations. Its members include Eurocard International, Deutsche Postbank, and Motorola. http://www.gmcig.org .

  7. RADICCHIO, which is to reach a consensus for secure m-commerce in interoperability issues. Its members include Siemens, Ericsson, and Mastercard. http://www.radicchio.org .

  8. WAP ECOMEG, which is a WAP FORUM focusing on all issues relating to e-commerse. http://www.ecomeg.org .

  9. Telenor and Ericsson: Wireless LAN as a complementary GPRS access technology. White paper, 2001.

    Google Scholar 

  10. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, ISO/IEC 8802-11: 1997(E), 1997/IEEE 802.11, 1997.

    Google Scholar 

  11. C. Rigney et al.: Remote Authentication Dial in User Service (RADIUS), RFC 2865.

    Google Scholar 

  12. M. WAHL et al: Lightweight Directory Access Protocol (v3), RFC 2251.

    Google Scholar 

  13. INTEL E-business Group, Wireless LAN, White Paper, December 2002.

    Google Scholar 

  14. HIPERLAN/2 Global Forum: http://www.hiperlan2.com .

  15. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, High Speed Physical Layer in the 5 GHz Band, ISO/IEC 8802-11: 2000(E), 2000.

    Google Scholar 

  16. 3rd Generation Partnership Project 2, IP Network Architecture Model for CDMA2000 Spread Spectrum Systems, S.R0032-0 v2.0, May 2002, http://www.3gpp2.org/Public_html/specs/S.R0032-0_v.2.0.doc.pdf .

  17. C. Perkins: IP Mobility Support, RFC 3220, IETF, January 2002. http://www.ietf.org/rfc/rfc3220.txt .

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vincze, S. (2003). How Secure Personal Mobility Can Be?. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds) Computational Science and Its Applications — ICCSA 2003. ICCSA 2003. Lecture Notes in Computer Science, vol 2667. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44839-X_26

Download citation

  • DOI: https://doi.org/10.1007/3-540-44839-X_26

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40155-1

  • Online ISBN: 978-3-540-44839-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics