Security Features Used for Heterogeneous Networks in Wireless Architecture

Only available on StudyMode
  • Download(s) : 117
  • Published : May 31, 2013
Open Document
Text Preview
ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)

IJCST Vol. 3, ISSue 1, Jan. - MarCh 2012

Security Features used for Heterogeneous Networks in Wireless Architecture 1

Arshi Shamsi, 2Saoud Sarwar, 3Shamim Ahmad, 4Shahroukh Khan
2

IIMT Engineering College, Meerut, UP, India Al-Falah School of Engineering & Technology 3 Integral University, Lucknow, UP, India 4 APTECH, New Delhi, India 1

Abstract The ever-increasing demand of users for various wireless communication services has lead to the development and to the coexistence of different, and often incompatible, wireless networks. Each one of these wireless networks has its own unique application and characteristics, as compared to other networks. Moreover, each network continues to evolve individually, most frequently not in a coordinated manner with other networks, further reducing compatibility among these networks. An integrated security mechanism is one of the key challenges in the Open Wireless network Architecture (OWA) because of the diversity of the wireless networks in OWA and the unique security mechanism used in each one of these networks. The overall security of the network is as strong as its weakest component; integration of the overall security mechanism in OWA is of primary importance. In this paper, we comparatively analyze the unique network-centric features and security mechanisms of various heterogeneous wireless networks that are expected to be a part of OWA. Keywords Wireless Architecture, OWA, Security, Heterogeneous Networks I. Introduction The ever-increasing demand of users for various wireless communication services has lead to the development and to the coexistence of different, and often incompatible, wireless networks. Each one of these wireless networks has its own unique application and characteristics, as compared to other networks. Moreover, each network continues to evolve individually, most frequently not in a coordinated manner with other networks, further reducing compatibility among these networks. From the user’s perspective, the future networks will implement Personal Service Mobility (PSM)—supporting ubiquitous and consistent access to the networks and preserving the user interfaces to network services, independent of the location of the user, including when the user roams across different networks. From the perspective of the network, the realization of PSM will be accomplished through the integration of the various different wireless networks by the Open Wireless network Architecture (OWA). We term such individual networks OWA-related wireless networks. A. Network Integration Model The ever-increasing demand of users for various wireless communication services has lead to the development and to the co-existence of different, and often incompatible, wireless networks. Each one of these wireless networks has its own unique application and characteristics, as compared to other networks. Moreover, each network continues to evolve individually, most frequently not in a coordinated manner with other networks. The integration of the various different wireless networks by the Open Wireless network Architecture (OWA) are termed individually as w w w. i j c s t. c o m

OWA-related wireless networks. We classify a network-centric integration model as either a tightly-coupled or a loosely-coupled model. In the tightly-coupled model, a network connects to another network as an alternative radio-access network. In a loosely coupled model the RNC of two wireless networks are independent and separated from each other. Therefore, gateway functionality between the two RNC is required. To integrate several OWA-related wireless networks into a single architecture, there are a number of challenges that must be addressed; these include support for mobility management, Quality of Service (QoS) provisioning, and security interoperability. Especially, integration of security techniques used by these various and different networks is...
tracking img