2005
DOI: 10.1145/1094549.1094557
|View full text |Cite
|
Sign up to set email alerts
|

Secure universal mobility for wireless Internet

Abstract: The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and GPRS. An enterprise user desires to be reachable while outside one's enterprise networks and requires minimum interruption while ensuring that the signaling and data traffic is not compromised during one's movement within the enterprise and between enterprise and external networks. We describe the design, implementation and performanc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…The MOBOPTS working group within the IRTF (Internet Research Task Force) and the DNA (Detecting Network Attachment) working group within the IETF have been investigating ways to support optimized handover by using appropriate triggers and events from the lower layers. References [4,7] describe mobility management techniques that consider both security and heterogeneous mobility. Although many of these techniques use cross-layer mechanisms and "make-before-break" algorithms to provide fast-handover, it is desirable to have a standardized method to handle mobility across heterogeneous networks in an efficient manner.…”
Section: Related Workmentioning
confidence: 99%
“…The MOBOPTS working group within the IRTF (Internet Research Task Force) and the DNA (Detecting Network Attachment) working group within the IETF have been investigating ways to support optimized handover by using appropriate triggers and events from the lower layers. References [4,7] describe mobility management techniques that consider both security and heterogeneous mobility. Although many of these techniques use cross-layer mechanisms and "make-before-break" algorithms to provide fast-handover, it is desirable to have a standardized method to handle mobility across heterogeneous networks in an efficient manner.…”
Section: Related Workmentioning
confidence: 99%
“…Such a mechanism is provided by the Mobility and Multihoming IKE (MOBIKE) protocol [9,15], which enables a mobile user with an established VPN to move from one access network to another, without re-establishing the IPsec_SAs. Moreover, Dutta et al [7] design and implement a secure universal mobility architecture, which incorporates standard mobility management protocols, such as Mobile IP, to deploy a mobile VPN.…”
Section: Comparison Of the Scenariosmentioning
confidence: 99%
“…There are other works that focus on network services, providing security and service continuation for wireless communications [3], and [4], but do not take into account the network selection problem. MDS data analysis techniques have been used for several problems with good results.…”
Section: Motivationmentioning
confidence: 99%
“…Let us assume that the data is important for the company and that it should be treated as confidential. The decision engine selects as ideal link speed 20 kbps, according to the running applications, since the domain is recognized as the car, the decision engine selects complete mobility (3). The Home/Work value is set as 2 (work).…”
Section: Decision Engine Modulementioning
confidence: 99%
See 1 more Smart Citation