A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper ...
A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new
horizontal platform service models with vertical cross-layer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted.
Security Interworking for Seamless Wireless Service - This thesis analyzes security mechanisms in wireless networks, and designs a secure and efficient protocol for a handover reusing the key materials generated before the handover phase. Especially, we describe in this thesis a handover scenario between WLAN and a WiBro network and propose a fast and efficient authentication scheme for the handover. In the scheme, a Serving Network (SN) plays a key distribution center role so that the Mobile Node
(MN) can be quickly associated to a Target Network (TN) before starting a full authentication scheme where a remote Authentication Center (AC) is involved. In order to be sure that our handover protocol does not have any security flaws, we formally validated it using automatic protocol analyzer AVIPSA.
Evaluation Model for Balanced Wireless Service - As wireless network cannot dispense with a proper security measure due to its inborn vulnerability, a new security measure has been developed with an advent of new wireless network technology. Each security measure properly serves the security needs of its associated wireless network as it was intended to. In heterogeneous environments, to design the balanced security components,
quantitative evaluation model of security policy in wireless networks is required. Quality of Protection (QoP) estimates the stability of individual network system by quantifying security intensity. So, it can work as an evaluation standard for the security of network. Firstly, this thesis
considers Historical Vulnerability Measure (HVM) and relative weight in total reward function for the improved QoP model. HVM is objectively organized by Flow-based Abnormal Traffic Detection Algorithm for utility
function.
Secondly, to design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the QoP, we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this thesis will help to assure the appropriate benchmark for combined security components in wireless networks.