The interaction of security and survivability in hybrid wireless networks

Information assurance techniques employed in wired networks have limited direct applicability in wireless networks because of the unique aspects of wireless networks (e.g., user mobility, wireless communication channel, power conservation, limited computational power in mobile nodes, security at the link layer, etc.). The interaction between the components of information assurance, namely availability and security in a wireless network environment poses new challenges. In this article, we present a framework for understanding survivability and security in wireless network and also discuss the issues related to the interaction between survivability and security in hybrid wireless access networks.

[1]  Yi-Bing Lin,et al.  Improving the fault tolerance of GSM networks , 1998, IEEE Netw..

[2]  P. E. Wirth,et al.  Teletraffic implications of database architectures in mobile and personal communications , 1995, IEEE Commun. Mag..

[3]  Martin Grötschel,et al.  Survivable mobile phone network architectures: models and solution methods , 1998 .

[4]  Davide Grillo Personal communications and traffic engineering in ITU-T: the developing E.750-series of recommendations , 1996, IEEE Wirel. Commun..

[5]  Teresa A. Dahlberg,et al.  Providing fault tolerance in wireless access networks , 2002, IEEE Commun. Mag..

[6]  William A. Arbaugh,et al.  An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .

[7]  Markus Jakobsson,et al.  Security Weaknesses in Bluetooth , 2001, CT-RSA.

[8]  Nuno Neves,et al.  Adaptive recovery for mobile environments , 1997, CACM.

[9]  Upkar Varshney,et al.  Reliability and Survivability of Wireless and Mobile Networks , 2000, Computer.

[10]  Kaushik Das,et al.  Interference and SIR in Integrated Voice/Data Wireless DS-CDMA Networks - A Simulation Study , 1997, IEEE J. Sel. Areas Commun..

[11]  Upkar Varshney,et al.  Designing survivable wireless and mobile networks , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).

[12]  David Tipper,et al.  PCS network survivability , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).

[13]  Sarvar Patel,et al.  Weaknesses of North American wireless authentication protocol , 1997, IEEE Wirel. Commun..

[14]  Apostolis K. Salkintzis,et al.  WLAN-GPRS integration for next-generation mobile data networks , 2002, IEEE Wirel. Commun..

[15]  Yuguang Fang,et al.  Implicit Deregistration with Forced Registration for PCS Mobility Management , 2001, Wirel. Networks.

[16]  Bruce Schneier,et al.  Cryptanalysis of the Cellular Encryption Algorithm , 1997, CRYPTO.

[17]  Yi-Bing Lin Failure restoration of mobility databases for personal communication networks , 1995, Wirel. Networks.

[18]  Yi-Bing Lin,et al.  Demand re‐registration for PCS database restoration , 2000, Mob. Networks Appl..

[19]  Teresa A. Dahlberg,et al.  Survivability Analysis for Mobile Cellular Networks , 2005 .

[20]  Hugo Krawczyk,et al.  Security issues in a CDPD wireless network , 1995, IEEE Wirel. Commun..

[21]  Stefan Parkvall,et al.  Future-generation wireless networks , 2001, IEEE Wirel. Commun..

[22]  Fred J. Kaudel,et al.  Framework for network survivability performance , 1994, IEEE J. Sel. Areas Commun..