11 Security

4
8/12/2019 11 Security http://slidepdf.com/reader/full/11-security 1/4

Transcript of 11 Security

Page 1: 11 Security

8/12/2019 11 Security

http://slidepdf.com/reader/full/11-security 1/4

Page 2: 11 Security

8/12/2019 11 Security

http://slidepdf.com/reader/full/11-security 2/4

158   Editorial

The papers in the system/network architecture category can be roughly categorized under 

the following sub-categories:  ad-hoc  networks, heterogeneous systems, and networks and

mobility services.In the sub-category of  ad-hoc networks, there are three papers: “ An Adaptive and Predic-

tive Security Model for Mobile Ad hoc Networks”, “ Providing Fault-Tolerant Ad-hoc Routing

Service in Adversarial Environments” and “ Adaptive Security for Low Data Rate Networks”.

The first paper presents an adaptive and predictive security model for  ad-hoc networks which

uses a fuzzy logic control. The predictive method in the paper allows analyzing the kind

of attack that is possible given an adaptive network. The paper also presents some experi-

mental evaluations. The second paper proposes a new routing protocol known as Best-effort

Fault-Tolerant Routing (BFTR). Simulation results show that the proposed BFTR signifi-

cantly improves the performance of   ad-hoc   routing even in the presence of misbehaving

nodes. The last paper discusses low data rate networks that make use of  ad-hoc networking.

This paper gives solutions for three different types of applications with low, medium or highsecurity requirements. Various cryptographic algorithms are studied and simulation results

are presented to find the best crypto-algorithm and protocols for the three different types of 

applications.

The three papers in the heterogeneous networks sub-category are “Secure Service and 

 Network Framework for Mobile Ethernet ”, “ Authentication and Billing Protocols for the

 Integration of WLAN and 3G Networks”, and “Towards Certificate-based Authentication

 for Future Mobile Communications”. These three papers discuss methods for integration

and interworking of various radio access technologies and their networks. The first pa-

per proposes a layer-2 network and system architecture, in which layer two addressing

and mobility can be used instead of IP addressing and routing. The next two papers dis-

cuss methods to combine WLANs and 3G networks using certificates. Although both pa-

pers use the same tool – certificates and PKIs – the solutions presented by the two aredifferent.

The paper in the mobility services sub-category is entitled “ A Security Architecture for 

 Mobility-Related Services”. This paper addresses the issue of authentication and authoriza-

tion of services for inter-domain roaming. As a solution, a generic architecture is presented

called iARSec or inter access router security. Performance results and comparison with similar 

existing solutions are also presented in the paper.

The final category of papers deals with implementation and experimental study. The three

papers accepted in this category are “Cryptographically Generated Address for Constrained 

 Devices”, “ Efficient ECC implementation for PDAs” and “ Experimental Analysis of an SSL-

based AKA Mechanism in 3G-and-beyond Wireless Networks”. The first paper presents a new

solution for cryptographically generated address (CGA) and gives performance gain withthe proposed solution. The next paper looks at devices with low computational power and

memory like PDAs and describes how to use elliptic curve cryptography (ECC) on such

devices. Different implementation methods and ways to make them faster on small devices

are compared. The last paper provides the results of some experiments using SSL/TLS in a

heterogeneous network environment with GPRS and IEEE 802.11b. The results showed that

the expected high data rates on one hand and protocol optimizations on the other hand, can

make SSL-based authentication a realistic solution in terms of service time for future mobile

systems.

As a whole the special issue covers a variety of topics being discussed and under consider-

ation in the security community studying next generation wireless communications systems.

Page 3: 11 Security

8/12/2019 11 Security

http://slidepdf.com/reader/full/11-security 3/4

 Editorial   159

We, as guest editors, of this special issue would like to thank the authors for sending their 

work in response to the call for papers and the reviewers for their time and effort. Our thanks

also to the editors of the journal for inviting us as guest editors of this special issue.

A.R. Prasad

J. Kempf 

Anand Raghawa Prasad (The Netherlands), senior researcher, DoCoMo Euro-Labs, Munich,

Germany was born in Ranchi, India. He received his PhD degree in the field of WLANs: proto-

cols, security anddeployment andMSc (Ir.) degree in E.E. from Delft University of Technology,

The Netherlands in 2003 and 1996, respectively. From 1996 to 1998 November he worked as

research engineer and later project leader in Uniden Corporation, Tokyo, Japan. From 1998

to 2000, he worked as systems architect for IEEE 802.11 based WLANs in Lucent Tech-

nologies (now Agere Systems) in The Netherlands. Subsequently, he was technical director 

at Genista Corporation, Tokyo, Japan. In addition to his publications in journals, interna-

tional conferences and chapters in books, he has several patent applications in the fieldof wireless communications and has co-edited a book titled “WLAN Systems and Wireless

 IP for Next Generation Communications” published by Artech House. He has co-authored

a book on “Wireless LANs and Wireless IP: Security, Mobility, QoS and Mobile Network 

 Integration” to be published by Artech House January 2005. He has participated in orga-

nizing of various International Conferences including VTC, PIMRC and WPMC. His re-

search interests include software radio, next generation wireless systems, networks and access,

security, mobility and QoS for wireless systems and IP networking. He is a senior member of 

IEEE.

James Kempf  graduated from University of Arizona with a PhD in Systems Engineering in

1984 and immediately went to work in Silicon Valley. Prior to his current position, Dr. Kempf 

spent 13 years at Sun Microsystems, primarily in research, where, among other projects,

Page 4: 11 Security

8/12/2019 11 Security

http://slidepdf.com/reader/full/11-security 4/4

160   Editorial

in 1994 he was technical lead for a project to develop a mobile, wireless SparcStation that

used an early version of 802.11. In 2002, Dr. Kempf joined Docomo Labs USA as a re-

search fellow, where he works on IP protocols and architectures for 4G wireless systems.Dr. Kempf is active in IETF as working group chair of two working groups, Seamoby and

SEND, developing wireless-related protocols, and is a former member of the Internet Archi-

tecture Board.