Security protocols for Wireless Local Area Networks (WLANs) and cellular networks

Sherali Zeadally, Farhan Siddiqui

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Over the last couple of years, many heterogeneous wireless access technologies have emerged and they have become an integral part of the Internet. In particular, we have experienced an explosive growth in the use of Wireless Local Area Networks (WLANs) and cellular networking technologies (such as Code Division Multiple Access (CDMA), Universal Mobile Telecommunication System (UMTS), General Packet Radio Service (GPRS)). High mobility of wireless users requires that the underlying heterogeneous network infrastructure provides uninterrupted wireless connectivity and service access anywhere, anytime. An additional requirement that is becoming increasingly important for mobile users is the ability to maintain secure connections while on the move across different wireless access technologies. There are some significant challenges (for example, fast, secure handoffs) that need to be overcome to achieve this goal because there is no single end-to-end security protocol that works across both WLANs and cellular networks. We review the various security protocols currently deployed over WLANs and cellular networks. We discuss some of the most recent research efforts on end-to-end security techniques that have been recently deployed across integrated WLAN-Cellular networks. We highlight some of the main benefits and major limitations associated with each security approach. It is hoped that the security solutions discussed will benefit other researchers and designers working to solve the challenge of providing seamless, secure service access across heterogeneous WLAN/Cellular networks.

Original languageEnglish
Pages (from-to)11-25
Number of pages15
JournalJournal of Internet Technology
Volume8
Issue number1
StatePublished - Jan 2007

Keywords

  • Authentication
  • Handoff
  • Networking
  • Protocol
  • Security
  • Wireless

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Security protocols for Wireless Local Area Networks (WLANs) and cellular networks'. Together they form a unique fingerprint.

Cite this