Abstract
Over the last couple of years, many heterogeneous wireless access technologies have emerged and they have become an integral part of the Internet. In particular, we have experienced an explosive growth in the use of Wireless Local Area Networks (WLANs) and cellular networking technologies (such as Code Division Multiple Access (CDMA), Universal Mobile Telecommunication System (UMTS), General Packet Radio Service (GPRS)). High mobility of wireless users requires that the underlying heterogeneous network infrastructure provides uninterrupted wireless connectivity and service access anywhere, anytime. An additional requirement that is becoming increasingly important for mobile users is the ability to maintain secure connections while on the move across different wireless access technologies. There are some significant challenges (for example, fast, secure handoffs) that need to be overcome to achieve this goal because there is no single end-to-end security protocol that works across both WLANs and cellular networks. We review the various security protocols currently deployed over WLANs and cellular networks. We discuss some of the most recent research efforts on end-to-end security techniques that have been recently deployed across integrated WLAN-Cellular networks. We highlight some of the main benefits and major limitations associated with each security approach. It is hoped that the security solutions discussed will benefit other researchers and designers working to solve the challenge of providing seamless, secure service access across heterogeneous WLAN/Cellular networks.
Original language | English |
---|---|
Pages (from-to) | 11-25 |
Number of pages | 15 |
Journal | Journal of Internet Technology |
Volume | 8 |
Issue number | 1 |
State | Published - Jan 2007 |
Keywords
- Authentication
- Handoff
- Networking
- Protocol
- Security
- Wireless
ASJC Scopus subject areas
- Software
- Computer Networks and Communications