A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical cross-layer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.
[1]
Janise McNair,et al.
An experimental study of cross-layer security protocols in public access wireless networks
,
2005,
GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[2]
Ieee Microwave Theory,et al.
IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Draft Amendment: Management Information Base Extensions
,
2007
.
[3]
Wenye Wang,et al.
On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility
,
2007,
Mob. Networks Appl..
[4]
Bruce Potter,et al.
Wireless Security's Future
,
2003,
IEEE Secur. Priv..
[5]
Jari Arkko,et al.
Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)
,
2006,
RFC.
[6]
Nora Dabbous,et al.
Security for Mobile Networks and Platforms
,
2006,
Artech house universal personal communications series.
[7]
Klara Nahrstedt,et al.
Quality of protection for mobile multimedia applications
,
2003,
2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).