An IBC and Certificate Based Hybrid Approach to WIMAX Security

An IBC and Certificate Based Hybrid Approach to WIMAX Security
Title An IBC and Certificate Based Hybrid Approach to WIMAX Security PDF eBook
Author Mete Rodoper
Publisher
Pages 44
Release 2010
Genre IEEE 802.16 (Standard)
ISBN

Download An IBC and Certificate Based Hybrid Approach to WIMAX Security Book in PDF, Epub and Kindle

WiMAX is a promising technology that provides high data throughput with low delays for various user types and modes of operation. These advantages make WiMAX applicable both for infrastructure purposes and end-client usage. Since WiMAX is presented as a network framework and a last-mile technology, it is believed to be capable of handling a wide range of usage scenarios. For example, while the end users have an opportunity to use WiMAX as the primary connection medium for acquiring services such as on-demand video streaming, VoIP connections and mobile bank transactions, the service providers may use it for data relaying purposes among access points. To meet the technical requirements of these various scenarios, majority of the WiMAX research has been conducted on physical and MAC layers; however little has been invested in a comprehensive and efficient security solution, which has resulted in a wide range of security weaknesses and reactive solutions. Many security problems remain to be addressed in different modes and for different user types even in the final security standard of WiMAX, PKMv2. In this thesis, we present a hybrid security solution combining Identity-Based Cryptography (IBC) and certificate based approaches to overcome the existing security problems of WiMAX without degrading service quality. IBC has potential benefits that can provide enhancements to the overall security and efficiency of the security standard. One such enhancement is combining user identity with the public key and therefore eliminating the public key distribution load from the network. However, IBC has a few caveats, such as the necessity of a secure medium to distribute private keys. To compensate for these disadvantages, in this study, IBC is combined with certificate-based security. As a result, the benefits of IBC are maintained while the disadvantages are eliminated. Using the hybrid approach, this study also aims to clarify the key revocation procedures and key lifetimes of WiMAX. To achieve this goal, key renewal intervals are examined and corresponding lifetimes are assigned to the credentials missing in both PKMv2 and PKMv1. Additionally, the key distribution procedures are investigated and a pattern is provided with the message exchange details. To be able to correctly assess the efficiency of this approach, a new mobility model is defined in the evaluation chapter of this thesis. Based on this model, the analysis has shown that our hybrid solution that combines IBC and the certified based security scheme results in a significant bandwidth improvement over the standards approach, PKMv2. This work is the first study that unites the advantages of both IBC and the certified-based security scheme for improved security while maintaining low overhead for WiMAX.

Issues in Networks Research and Application: 2011 Edition

Issues in Networks Research and Application: 2011 Edition
Title Issues in Networks Research and Application: 2011 Edition PDF eBook
Author
Publisher ScholarlyEditions
Pages 1093
Release 2012-01-09
Genre Computers
ISBN 1464965668

Download Issues in Networks Research and Application: 2011 Edition Book in PDF, Epub and Kindle

Issues in Networks Research and Application: 2011 Edition is a ScholarlyEditions™ eBook that delivers timely, authoritative, and comprehensive information about Networks Research and Application. The editors have built Issues in Networks Research and Application: 2011 Edition on the vast information databases of ScholarlyNews.™ You can expect the information about Networks Research and Application in this eBook to be deeper than what you can access anywhere else, as well as consistently reliable, authoritative, informed, and relevant. The content of Issues in Networks Research and Application: 2011 Edition has been produced by the world’s leading scientists, engineers, analysts, research institutions, and companies. All of the content is from peer-reviewed sources, and all of it is written, assembled, and edited by the editors at ScholarlyEditions™ and available exclusively from us. You now have a source you can cite with authority, confidence, and credibility. More information is available at http://www.ScholarlyEditions.com/.

5G-Enabled Internet of Things

5G-Enabled Internet of Things
Title 5G-Enabled Internet of Things PDF eBook
Author Yulei Wu
Publisher CRC Press
Pages 396
Release 2019-05-29
Genre Computers
ISBN 0429578393

Download 5G-Enabled Internet of Things Book in PDF, Epub and Kindle

How the enabling technologies in 5G as an integral or as a part can seamlessly fuel the IoT revolution is still very challenging. This book presents the state-of-the-art solutions to the theoretical and practical challenges stemming from the integration of 5G enabling technologies into IoTs in support of a smart 5G-enabled IoT paradigm, in terms of network design, operation, management, optimization, privacy and security, and applications. In particular, the technical focus covers a comprehensive understanding of 5G-enabled IoT architectures, converged access networks, privacy and security, and emerging applications of 5G-eabled IoT.

LTE Security

LTE Security
Title LTE Security PDF eBook
Author Dan Forsberg
Publisher John Wiley & Sons
Pages 277
Release 2011-06-09
Genre Technology & Engineering
ISBN 1119957303

Download LTE Security Book in PDF, Epub and Kindle

Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms employed to meet these requirements. Whilst the industry standards inform how to implement systems, they do not provide readers with the underlying principles behind security specifications. LTE Security fills this gap by providing first hand information from 3GPP insiders who explain the rationale for design decisions. Key features: Provides a concise guide to the 3GPP/LTE Security Standardization specifications Authors are leading experts who participated in decisively shaping SAE/LTE security in the relevant standardization body, 3GPP Shows how GSM and 3G security was enhanced and extended to meet the requirements of fourth generation systems Gives the rationale behind the standards specifications enabling readers to have a broader understanding of the context of these specifications Explains why LTE security solutions are designed as they are and how theoretical security mechanisms can be put to practical use

The IOT Physical Layer

The IOT Physical Layer
Title The IOT Physical Layer PDF eBook
Author Ibrahim M. Elfadel
Publisher
Pages
Release 2019
Genre Internet of things
ISBN 9783319931012

Download The IOT Physical Layer Book in PDF, Epub and Kindle

This book documents some of the most recent advances on the physical layer of the Internet of Things (IoT), including sensors, circuits, and systems. The application area selected for illustrating these advances is that of autonomous, wearable systems for real-time medical diagnosis. The book is unique in that it adopts a holistic view of such systems and includes not only the sensor and processing subsystems, but also the power, communication, and security subsystems. Particular attention is paid to the integration of these IoT subsystems as well as the prototyping platforms needed for achieving such integration. Other unique features include the discussion of energy-harvesting subsystems to achieve full energy autonomy and the consideration of hardware security as a requirement for the integrity of the IoT physical layer. One unifying thread of the various designs considered in this book is that they have all been fabricated and tested in an advanced, low-power CMOS process, namely GLOBALFOUNDRIES 65nm CMOS LPe. In summary, this volume Provides up-to-date information on the architecture, design, implementation and testing of IoT sensors, circuits, and systems; Discusses communication transceivers and protocols for IoT systems dedicated to medical diagnosis; Discusses energy autonomy, power management, and hardware security the IoT physical layer; Enables the design and silicon implementation of systems-on-chip to medical and surveillance applications; Includes coverage of FPGA prototyping platforms for IoT nodes.

Smart Grids and Their Communication Systems

Smart Grids and Their Communication Systems
Title Smart Grids and Their Communication Systems PDF eBook
Author Ersan Kabalci
Publisher Springer
Pages 661
Release 2018-09-01
Genre Technology & Engineering
ISBN 9811317682

Download Smart Grids and Their Communication Systems Book in PDF, Epub and Kindle

The book presents a broad overview of emerging smart grid technologies and communication systems, offering a helpful guide for future research in the field of electrical engineering and communication engineering. It explores recent advances in several computing technologies and their performance evaluation, and addresses a wide range of topics, such as the essentials of smart grids for fifth generation (5G) communication systems. It also elaborates the role of emerging communication systems such as 5G, internet of things (IoT), IEEE 802.15.4 and cognitive radio networks in smart grids. The book includes detailed surveys and case studies on current trends in smart grid systems and communications for smart metering and monitoring, smart grid energy storage systems, modulations and waveforms for 5G networks. As such, it will be of interest to practitioners and researchers in the field of smart grid and communication infrastructures alike.

Applied Cryptography and Network Security

Applied Cryptography and Network Security
Title Applied Cryptography and Network Security PDF eBook
Author Jaydip Sen
Publisher BoD – Books on Demand
Pages 394
Release 2012-03-14
Genre Computers
ISBN 9535102184

Download Applied Cryptography and Network Security Book in PDF, Epub and Kindle

Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. The book contains sixteen chapters which deal with security and privacy issues in computing and communication networks, quantum cryptography and the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography. It will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.