Security privacy and accountability in wireless access networks pdf




















The purpose of this paper is to examine security, accountability and privacy issues in wireless networks. The presence of global connectivity provided by wireless communications and mobile computing has changed the way humans beings interact with each other. Now days Wireless technologies have become more and more popular in our everyday live. Personal digital assistants allow us individuals to access World Wide Web more frequently e-mail, social networking, web browsing etc.

Some technologies even support global positioning system GPS capabilities that can locate the location of the device anywhere in the world. Wireless communication technologies promise to offer even more features and functions in the next few decades.

An increasing number of agencies in different areas public sectors, private. Wireless communications offer many benefits such as portability and flexibility, lower installation costs, and increased productivity. Wireless technologies cover a broad range ofcapabilities like it allows users to move their laptops from place to place within their work area without theneed for wires and without losing network connectivity.

Less wiring provide greater flexibility, reliability, increasedefficiency, and reduced wiring costs in communication. Bluetooth functionalityalso eliminates cables for printer, scanner, plotters and other peripheral device connections. Handheld devices such asPDA and mobile phones allow remote users to synchronize personal datasand provide access to network services such as Internet access.

Moreover, these technologies can offer more dramatic cost savings and new capabilities to diverse applicationsranging in different areas of organization. However, risks are inherent in any wireless communication network.

Some of these risks are similar to those of wirednetworks and some are new. Perhaps the most significantsource of attack in wireless communication networks is that the technologies underlying communications medium, theairwave, is open to attackers, hackers.

The loss of confidentiality and integrity and the threat of denial of service DoS attacks are riskstypically associated with wireless communications. Unauthorized users may gain access to communication network , corrupt the organizations data, consume network bandwidth, degrade communication.

In this paper section 1 describe the introduction of the paper, section 2 provide overview of wireless network, section 3 provide accountability, privacy and security in wireless network and section 4 provide conclusion of the paper.

Wireless network refers to a type of computer network that is not connected through any kind of cable. It is a method by which homes; organizations, telecommunications networks and enterprise installations avoid the costly process of introducing cables for networking, or as a connection between various equipment locations. Wireless communications networks are generally implemented and administered using radio communication, this implementation takes place at the layer of the OSI model.

In this paper [1], author proposed a general three-tier security framework for authentication and pairwise key establishment between mobile sinks and sensor nodes. The proposed scheme, based on the polynomial pool-based key predistribution scheme substantially improved network resilience to mobile sink replication attacks compared to the single polynomial pool- based key predistribution approach. In [2], Authors argue that new security paradigms which exploit physical layer properties of the wireless medium, such as the rapid spatial, spectral, and temporal decorrelation properties of the radio channel, can enhance confidentiality and authentication services.

In this they provide a case study for how such strategies can be integrated into a broader security framework for a wireless network. In [3], this authors examine security and privacy issues in some new and emerging wireless networks.

In surveying they tried to identify new security and privacy challenges as well as inadequacies of current approaches. Certain challenges arise from the unattended, intermittently connected, and possibly mobile network operation. In this [4] authors look into two important data security issues: secure and dependable distributed data storage, and fine-grained distributed data access control for sensitive and private patient medical data.

They discussed variouspractical issues that need to be taken into account while fulfilling the security and privacy requirements. In [5] authors proposed a novel dynamic security-aware packet-scheduling algorithm, which is capable of achieving high quality of security for real time packets while making the best effort to guarantee real time requirements of those packets.

The proposed algorithm can substantially improve both quality of security and real-time packet guarantee ratio under a wide range of workload characteristics. The proposed opportunistic encryption produces significant improvement in the performance compared to traditional approaches.

In [7] author provide a comprehensive discussion of security problems and current technologies in 3G and WLAN systems and introductory discussions about the security problems i interworking, the state-of-the-art solutions, and open problems.

In this. In [9] authors comparatively analyze the unique network-centric features and security mechanisms of various heterogeneous wireless networks that are expected to be part of OWA.

Then, after defining the specific integrated network model of OWA, they proposed an integrated security platform based on the security profile concept. Accountability in wireless network: Accountability is an important issue in computer and network systems.

One of the goals of accountability is the capability to trace an even after the event occurred so that the causes can be determined. Using accountability, one can track what happens to ones banking transactions by knowing who has logged into a bank account though a user ID, by reviewing the transactions made, and by noting other details. Accountability is being answerable, that is, taking responsibility for the transactions that are performed.

In this they applied methodology to media access control and routing layers in wireless networks. Zhifeng Xiao et al.

Bo Fu et al. Two methods to analyze the accountability of a network via the users accepted overhead, called Q- Accountable Logging by Overhead, and the flow-net record depth, called P- Accountable Logging, respectively. Simulation results show the feasibility and effectiveness of our flow-net scheme to achieve accountability. Two methods to evaluate the accountable logging of a network via the users accepted overhead called Q- Accountable Logging by Overhead , and P- Accountable Logging. In this paper, introduced a new scheme to improve the location privacy of wireless users while minimizing network disruption.

TAG, where no data privacy protection is provided. Results show the efficacy and efficiency of our schemes. In DADPP , all nodes within the same cluster are partitioned into many groups according to desired privacy-levels.

The goal of our work is to bridge the gap between collaborative data collection by wireless sensor networks and data privacy. This solution comprises of Identity, Route and Location IRL privacy algorithm and data privacy mechanism, that collectively provides protection against privacy disclosure attacks such as eavesdropping and hop-by-hop trace back attacks.

Moreover, the proposed scheme keeps the random coding feature, and each sink can recover the source packets by inverting the GEVs with a very high probability. Mohamed et al [21] 1. Proposed scheme can provide a strong protection against Hotspot- Locating attack with much less energy cost comparing to global-adversary- based schemes. Use of this web site signifies your agreement to the terms and conditions. Security, privacy, and accountability in wireless access networks Abstract: The presence of ubiquitous connectivity provided by wireless communications and mobile computing has changed the way humans interact with information.

At the same time, it has made communication security and privacy a hot-button issue. In this article we address the security and privacy concerns in wireless access networks. We first discuss the general cryptographic means to design privacy-preserving security protocols, where the dilemma of attaining both security and privacy goals, especially user accountability vs.

We then present a novel authentication framework that integrates a new key management scheme based on the principle of separation of powers and an adapted construction of Boneh and Shacham's group signature scheme, as an enhanced resort to simultaneously achieve security, privacy, and accountability in wireless access networks.



0コメント

  • 1000 / 1000