13-03-2011, 01:04 PM
Security in 4G Networks
all IP-based services for heterogenous wireless access technologies will be made available by the 4G. The mobile IP when combined with it will provide seamless access to internet. security services for mobile users and the QoS parameters are the two major challenges facing the 4G infrastructure. In this article, the method proposed for security is that authentication, authorization and accounting (AAA) is combined with the users' applications.
authentication, confidentiality, integrity, and authorization for the access of network connectivity are what deals with the security problems in 4G. the MN has to authenticate the user and also it has to authenticate itself to the user when it is in the roaming mode. Radius, COPS or Diameter are the AAA protocols that are used. The extensible network access authentication is provided by the Extensible Authentication Protocol (EAP) recently developed. The task of privacy and data integrity between two communicating applications can also be taken up by the layers above the network layer.
Get the report here:
http://citeseerx.ist.psu.edu/viewdoc/dow...1&type=pdf
all IP-based services for heterogenous wireless access technologies will be made available by the 4G. The mobile IP when combined with it will provide seamless access to internet. security services for mobile users and the QoS parameters are the two major challenges facing the 4G infrastructure. In this article, the method proposed for security is that authentication, authorization and accounting (AAA) is combined with the users' applications.
authentication, confidentiality, integrity, and authorization for the access of network connectivity are what deals with the security problems in 4G. the MN has to authenticate the user and also it has to authenticate itself to the user when it is in the roaming mode. Radius, COPS or Diameter are the AAA protocols that are used. The extensible network access authentication is provided by the Extensible Authentication Protocol (EAP) recently developed. The task of privacy and data integrity between two communicating applications can also be taken up by the layers above the network layer.
Get the report here:
http://citeseerx.ist.psu.edu/viewdoc/dow...1&type=pdf