메뉴 건너뛰기




Volumn 5, Issue 12, 2012, Pages 1325-1336

Secure data transmission with cloud computing in heterogeneous wireless networks

Author keywords

3G UMTS; 802.11 WLAN; Secure handoff; Secure key exchange

Indexed keywords

CLOUD COMPUTING; DATA COMMUNICATION SYSTEMS; DATA TRANSFER; HETEROGENEOUS NETWORKS; IEEE STANDARDS; MOBILE SECURITY; PUBLIC KEY CRYPTOGRAPHY; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 84870184323     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.409     Document Type: Article
Times cited : (3)

References (34)
  • 1
    • 84870193443 scopus 로고    scopus 로고
    • G. T. 23.060. 3GPP general packet radio service (GPRS), service description, stage 2 (release 6). 3GPP Standard
    • G. T. 23.060. 3GPP general packet radio service (GPRS), service description, stage 2 (release 6). 3GPP Standard, 2003.
    • (2003)
  • 2
    • 84871017023 scopus 로고    scopus 로고
    • The working group for IEEE 802.11 WLAN standards
    • The working group for IEEE 802.11 WLAN standards. http://www.ieee802.org/11/
  • 3
    • 0042474493 scopus 로고    scopus 로고
    • Integration of 802.11 and third-generation wireless data networks. IEEE INFOCOM
    • Buddhikot M, Chandranmenon G, Han S, Lee Y, Miller S, Salgarelli L. Integration of 802.11 and third-generation wireless data networks. IEEE INFOCOM, 2003; 503-512.
    • (2003) , pp. 503-512
    • Buddhikot, M.1    Chandranmenon, G.2    Han, S.3    Lee, Y.4    Miller, S.5    Salgarelli, L.6
  • 4
    • 84883870187 scopus 로고    scopus 로고
    • An architecture for integrating UMTS and 802.11 WLAN networks. IEEE Symposium on Computers and Communication (ISCC 2003)
    • Jaseemuddin M. An architecture for integrating UMTS and 802.11 WLAN networks. IEEE Symposium on Computers and Communication (ISCC 2003), 2003, 716-723.
    • (2003) , pp. 716-723
    • Jaseemuddin, M.1
  • 5
    • 84870211694 scopus 로고    scopus 로고
    • A one-time password system. IETF RFC 1938
    • Haller N, Metz C. A one-time password system. IETF RFC 1938, 1996.
    • (1996)
    • Haller, N.1    Metz, C.2
  • 6
    • 85177231215 scopus 로고    scopus 로고
    • Intercepting mobile communications: the insecurity of 802.11. Proceedings of the Seventh Annual International Conference on Mobile Computing And Networking
    • Borison N, Goldberg I, Wagner D. Intercepting mobile communications: the insecurity of 802.11. Proceedings of the Seventh Annual International Conference on Mobile Computing And Networking, 2001.
    • (2001)
    • Borison, N.1    Goldberg, I.2    Wagner, D.3
  • 7
    • 84870193452 scopus 로고    scopus 로고
    • An initial security analysis of the IEEE 802.1X standard. Department of Computer Science University of Maryland,CS-TR-43228
    • Mishra A, Arbaugh WA. An initial security analysis of the IEEE 802.1X standard. Department of Computer Science University of Maryland, CS-TR-43228, 2002.
    • (2002)
    • Mishra, A.1    Arbaugh, W.A.2
  • 8
    • 84871004781 scopus 로고    scopus 로고
    • IEEE Standards. IEEE 802.11i-2004: Amendment 6: medium access control (MAC) security enhancements.
    • IEEE Standards. IEEE 802.11i-2004: Amendment 6: medium access control (MAC) security enhancements. http://standards.ieee.org/getieee802/download/802.11i-2004.pdf, 2004.
    • (2004)
  • 9
    • 84870193455 scopus 로고    scopus 로고
    • G. T. 33.102. 3G security,security architecture (release 5). 3GPP Standard
    • G. T. 33.102. 3G security, security architecture (release 5). 3GPP Standard, 2003.
    • (2003)
  • 10
    • 84956854891 scopus 로고    scopus 로고
    • Key establishment protocols for secure mobile communications: a selective survey
    • Boyd C, Mathuria A. Key establishment protocols for secure mobile communications: a selective survey. Information Security and Privacy, Vol. 1438, 1998; 344-355.
    • (1998) Information Security and Privacy , vol.1438 , pp. 344-355
    • Boyd, C.1    Mathuria, A.2
  • 12
    • 18144365794 scopus 로고    scopus 로고
    • A seamless handoff scheme for UMTS-WLAN interworking. IEEE Global Communications Conference (GLOBECOM), Dallas, Texas, USA. .
    • Choi H-H, Song O, Cho D-H. A seamless handoff scheme for UMTS-WLAN interworking. IEEE Global Communications Conference (GLOBECOM), Dallas, Texas, USA. 2004.
    • (2004)
    • Choi, H.-H.1    Song, O.2    Cho, D.-H.3
  • 13
    • 0038307567 scopus 로고    scopus 로고
    • Mobility management in integrated UMTS/WLAN networks. IEEE International Conference on Communications (ICC), Anchorage, Alaska, USA. .
    • Varma VK, Ramesh S, Wong KD, Barton M, Hayward G, Friedhoffer JA. Mobility management in integrated UMTS/WLAN networks. IEEE International Conference on Communications (ICC), Anchorage, Alaska, USA. 2003.
    • (2003)
    • Varma, V.K.1    Ramesh, S.2    Wong, K.D.3    Barton, M.4    Hayward, G.5    Friedhoffer, J.A.6
  • 14
    • 24944506818 scopus 로고    scopus 로고
    • An improved interworking architecture for UMTS-WLAN tight coupling. IEEE Wireless Communications and Networking Conference (WCNC)
    • Liu C, Zhou C. An improved interworking architecture for UMTS-WLAN tight coupling. IEEE Wireless Communications and Networking Conference (WCNC), 2005.
    • (2005)
    • Liu, C.1    Zhou, C.2
  • 15
    • 33646800166 scopus 로고    scopus 로고
    • HCRAS: a novel hybrid internetworking architecture between WLAN and UMTS cellular networks. IEEE Consumer Communications and Networking Conference (CCNC)
    • Liu C, Zhou C. HCRAS: a novel hybrid internetworking architecture between WLAN and UMTS cellular networks. IEEE Consumer Communications and Networking Conference (CCNC), 2005.
    • (2005)
    • Liu, C.1    Zhou, C.2
  • 17
    • 35648970163 scopus 로고    scopus 로고
    • Handover management architectures in integrated WLAN/cellular networks. Surveys and Tutorials
    • Lampropoulos G, Kaloxylos A, Passas N, Merakos L. Handover management architectures in integrated WLAN/cellular networks. Surveys and Tutorials, 2005.
    • (2005)
    • Lampropoulos, G.1    Kaloxylos, A.2    Passas, N.3    Merakos, L.4
  • 18
    • 84870974652 scopus 로고    scopus 로고
    • Overview of 802.11b security. Intel Technology Journal
    • Weatherspoon S. Overview of 802.11b security. Intel Technology Journal, 2000, http://developer.intel.com/technology/itj/q22000/articles/art_5.htm
    • (2000)
    • Weatherspoon, S.1
  • 19
    • 84870177478 scopus 로고    scopus 로고
    • A stream cipher encryption algorithm. Working Documents of the Internet Engineering Task Force (IETF)
    • Kaukonen K, Thayer R. A stream cipher encryption algorithm. Working Documents of the Internet Engineering Task Force (IETF), 1997.
    • (1997)
    • Kaukonen, K.1    Thayer, R.2
  • 21
    • 84870210505 scopus 로고    scopus 로고
    • Securing the wireless LAN. Cisco Systems MSS Magazine
    • Meredith G. Securing the wireless LAN. Cisco Systems MSS Magazine, 2001.
    • (2001)
    • Meredith, G.1
  • 22
    • 84870210504 scopus 로고    scopus 로고
    • Remote authentication dial in user service. IETF RFC 2865
    • Rigney C, Willens S. Remote authentication dial in user service. IETF RFC 2865, 2000.
    • (2000)
    • Rigney, C.1    Willens, S.2
  • 23
    • 84870193451 scopus 로고    scopus 로고
    • Extensible Authentication Protocol (EAP). IETF RFC 3748
    • Aboba B, Blunk L, Vollbrecht J, Carlson J. Extensible Authentication Protocol (EAP). IETF RFC 3748, 2004.
    • (2004)
    • Aboba, B.1    Blunk, L.2    Vollbrecht, J.3    Carlson, J.4
  • 26
    • 84870211691 scopus 로고    scopus 로고
    • G. T. 33.102. 3G security,security architecture (release 1999). 3GPP Standard
    • G. T. 33.102. 3G security, security architecture (release 1999). 3GPP Standard, 2000.
    • (2000)
  • 27
    • 34250204664 scopus 로고    scopus 로고
    • Security management in the next generation wireless networks
    • Zhang Y, Fujise M. Security management in the next generation wireless networks. International Journal of Network Security 2006; 3(1): 1-7.
    • (2006) International Journal of Network Security , vol.3 , Issue.1 , pp. 1-7
    • Zhang, Y.1    Fujise, M.2
  • 28
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • Issue, IEEE, pages
    • Zhang M, Fang Y. Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications, Vol. 4, Issue 2, IEEE, pages 734-742, 2005.
    • (2005) IEEE Transactions on Wireless Communications , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.1    Fang, Y.2
  • 29
    • 36348954010 scopus 로고    scopus 로고
    • Efficient 3GPP authentication and key agreement with robust user privacy protection. IEEE Wireless Communications and Networking Conference (WCNC), Hong Kong, China. .
    • Juang W-S, Wu J-L. Efficient 3GPP authentication and key agreement with robust user privacy protection. IEEE Wireless Communications and Networking Conference (WCNC), Hong Kong, China. 2007.
    • (2007)
    • Juang, W.-S.1    Wu, J.-L.2
  • 31
    • 2342491867 scopus 로고    scopus 로고
    • A new security key exchange channel for 802.11 WLANs. IEEE Carnahan Conference on Security Technology
    • Ouyang YC, Chang RL, Chiu JH. A new security key exchange channel for 802.11 WLANs. IEEE Carnahan Conference on Security Technology, 2003.
    • (2003)
    • Ouyang, Y.C.1    Chang, R.L.2    Chiu, J.H.3
  • 32
    • 84870210509 scopus 로고    scopus 로고
    • Fast handovers for mobile IPv6. IETF Draft
    • Dommety G. Fast handovers for mobile IPv6. IETF Draft, 2001.
    • (2001)
    • Dommety, G.1
  • 33
    • 84870177481 scopus 로고    scopus 로고
    • Extensible Authentication Protocol method for 3rd generation EAP-AKA Authentication Protocol. IETF RFC 4187
    • Arkko J, Haverinen H. Extensible Authentication Protocol method for 3rd generation EAP-AKA Authentication Protocol. IETF RFC 4187, 2006.
    • (2006)
    • Arkko, J.1    Haverinen, H.2
  • 34
    • 84870211692 scopus 로고    scopus 로고
    • Extensible authentication protocol method for GSM subscriber identity modules (EAP-SIM). IETF RFC 4186
    • Haverinen H, Salowey J. Extensible authentication protocol method for GSM subscriber identity modules (EAP-SIM). IETF RFC 4186, 2006.
    • (2006)
    • Haverinen, H.1    Salowey, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.