• 검색어에 아래의 연산자를 사용하시면 더 정확한 검색결과를 얻을 수 있습니다.
  • 검색연산자
검색연산자 기능 검색시 예
() 우선순위가 가장 높은 연산자 예1) (나노 (기계 | machine))
공백 두 개의 검색어(식)을 모두 포함하고 있는 문서 검색 예1) (나노 기계)
예2) 나노 장영실
| 두 개의 검색어(식) 중 하나 이상 포함하고 있는 문서 검색 예1) (줄기세포 | 면역)
예2) 줄기세포 | 장영실
! NOT 이후에 있는 검색어가 포함된 문서는 제외 예1) (황금 !백금)
예2) !image
* 검색어의 *란에 0개 이상의 임의의 문자가 포함된 문서 검색 예) semi*
"" 따옴표 내의 구문과 완전히 일치하는 문서만 검색 예) "Transform and Quantization"
쳇봇 이모티콘
ScienceON 챗봇입니다.
궁금한 것은 저에게 물어봐주세요.

논문 상세정보


The proliferation of wireless local area networks (WLANs) offering high data rate in hot spot area have spurred the demand for possible WLANs and third-generation (3G) cellular network integration solutions as the initiative step towards 4G systems. This paper provides a novel architecture for seamless location-aware integration of WLANs into 3G cellular networks and also an analysis for the efficient handover techniques. We introduce location as a key context in secure roaming mechanism for context-aware interworking in 4G systems. The fast secure roaming with location-aware authentication is implemented at an entity called location-aware service (LAS) broker that utilizes the concepts of direction of user and pre-warming zone. The location-ware interworking architecture supports seamless roaming services among heterogeneous wireless networks including WLANs, wireless metropolitan area networks (WMANs), and 3G cellular networks. This paper also includes a description of procedures needed to implement efficient mobility and location management. We show how the LAS broker with pre-warming and context transfer can obtain significant lower latency in the vertical handover.

참고문헌 (45)

  1. B. Schilit et al., 'Wireless location privacy protection,' IEEE Computer, vol. 36, pp. 135-137, Dec. 2003 
  2. D. E. Denning and P. D. MacDoran. 'Location-based authentication: Grounding cyberspace for better security,' Computer Fraud and Security, Feb. 1996 
  3. G. Liu and G. Maguire Jr., 'A class of mobile motion prediction algo­rithms for wireless mobile computing and communicatons,' ACM/Baltzer MONET, vol. 1, no. 2, pp. 113-121, Oct. 1996 
  4. M. Vossiek, 'Wireless local positioning,' IEEE Microwave, vol. 4, pp. 77-­86, Dec. 2003 
  5. Q. He et a!., 'The auest for personal control over mobile location privacy,' IEEE Commun. Mag., vol. 42, pp. 130-136, May 2004 
  6. G. Kambourakis et al., 'Advanced SSL/TLS-based authentication for se­cure WLAN-3G interworking,' lEE Proc. Commun., vol. 151, no. 5, Oct. 2004 
  7. IEEE Standard 802.11i, July 2003 
  8. 3GPP TS 23.234 v6.1.0, '3GPP system to wireless local area network (WLAN) interworking: System description,' Release 6, June 2004 
  9. IETF Internet Draft, 'EAP tunneled TLS authentication protocol,' Apr. 2004 
  10. I. F. Akyildiz et al., 'A survey of mobility management in next-generation all-IP-based wireless systems,' IEEE Wireless Commun., vol. 11, pp. 16-­28, Aug. 2004 
  11. OpenSSL, http://www.openssl.org/ 
  12. OpenSAML, http://www.opensaml.org/ 
  13. J. McNair and Z. Fang, 'Vertical handoffs in fourth-generation multinet­work environments,' IEEE Wireless Commun., vol. 11, pp. 8-15, June 2004 
  14. R. Chellappa-Doss, A. Jennings, and N. Shenoy, 'User mobility prediction in hybrid and ad hoc wireless networks,' in Proc. ATNAC 2003, Dec. 2003 
  15. IEEE 802.1X, 'Port-based network access control,' 2001 
  16. M. Lee et al., 'A secure web services for location based services in wire­less networks,' Lecture Notes in Computer Science, vol. 3042, pp. 332-­344, May 2004 
  17. V. W.-S. Feng et al, 'WGSN: WLAN-based GPRS environment support node with push mechanism,' Computer J., vol. 47, no. 4, pp. 405-417, July 2004 
  18. V. Bhargavan and M. Jayanth, 'Profile-based next-cell prediction in indoor wireless LAN,' in Proc. IEEE SICON'97, Apr. 1997 
  19. OASIS Security Services TC, Security Assertion Markup Language (SAML) v1.1, Aug. 2003 
  20. W.-S. Soh and H. S. Kim, 'Dynamic bandwidth reservation in cellular networks using road topology based mobility predictions,' in Proc. IEEE INFOCOM 2004, Mar. 2004 
  21. A. R. Beresford and F. Stajano, 'Location privacy in pervasive comput­ing,' IEEE Pervasive Computing, vol. 2, pp. 46-55, Jan-Mar. 2003 
  22. J. E. Bardram et al., 'Context-aware user authentication - supporting proximity-based login in pervasive computing,' in Proc. UbiComp 2003, Oct. 2003 
  23. S. Y. Hui and K. H. Yeung, 'Challenges in the migration to 4G mobile systems,' IEEE Commun. Mag., pp. 54-59, Dec. 2003 
  24. P. Mahonen et al., 'Hop-by-hop toward future mobile broadband IP,' IEEE Commun. Mag., vol. 42, pp. 138-146, Mar. 2004 
  25. N. Montavont et al., 'Handover management for mobile nodes in IPv6 networks,' IEEE Commun. Mag., vol. 40, pp. 38-43, Aug. 2002 
  26. 3GPP TS 33.234 v050, '3G Security; wireless local area network (WLAN) interworking security,' Release 6, work in progress 
  27. IEEE Std. 802.16-2001, IEEE Standard for Local and Metropolitan Area Networks, part 16, 'Air interface for fixed broadband wireless access sys­tems,' IEEE Press, 2001 
  28. S. Dixit and R. Prasad, Wireless IP and Building the Mobile Internet, Artech House, 2003 
  29. M. Gruteser et al., 'Protecting privacy in continuous location-tracking applications,' IEEE SECURITY & PRIVACY, vol. 2, pp. 28-34, Mar.-Apr. 2004 
  30. C. Prehofer and Q. Wei, 'Active networks for 4G mobile communication: Motivation, architecture, and application scenarios,' in Proc. IWAN 2002, Dec. 2002 
  31. 3GPP TS 23.271 v6.9.0, '3GPPF functional stage 2 description oflocation services (LCS),' Release 6, Sept. 2004 
  32. FreeRADIUS, http://www.freeradius.org/ 
  33. M. Lee et al., 'A location-aware secure interworking architecture between 3GPP and WLAN systems,' Lecture Notes in Computer Science, vol. 3506, pp. 400-412, May 2005 
  34. M. Hazas et al., 'Location-aware computing comes of age,' IEEE Com­puter, vol. 37, pp. 95-97, Feb. 2004 
  35. A. K. Salkintzis, 'Interworking techniques and architectures for WLAN/3G integration toward 4G mobile data networks,' IEEE Wireless Commun., vol. 11, pp. 50-61, June 2004 
  36. V. Marques et al., 'An IP-based QoS architecture for 4G operator scenar­ios,' IEEE Wireless Commun., vol. 10, pp. 54-62, June 2003 
  37. G. M. Koien and T. Haslestad, 'Security aspects of 3G-WLAN interwork­ing,' IEEE Commun. Mag., vol. 41, pp. 82-88, Nov. 2003 
  38. N. Shenoy et al., 'Performance of a framework for seamless integration of cellular and WLANs,' in Proc. OPNETWORK 2004, Sept. 2004 
  39. K. D. Wong et al., 'Mobility management scheme for auto-configured wireless IP networks,' IEEE Wireless Commun., vol. 10, pp. 62-69, Oct. 2003 
  40. M. Shi et al., 'IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks,' IEEE Wireless Commun., pp. 66-75, Aug. 2004 
  41. T. Liu, P. Bahl, and I. Chlamtac, 'Mobility modeling, location tracking, and trajectory prediction in wireless ATM networks,' IEEE J. Select. Areas Commun., vol. 16, no. 16, pp. 922-936, Aug. 1998 
  42. IETF RFC 2716, 'PPP EAP-TLS authentication protocol,' Oct. 1999 
  43. G. D. Abowd et al., 'Cyberguide: A mobile context-aware tour guide,' ACM/Baltzer Wireless Networks, vol. 3, no. 5, pp. 421-433, Oct. 1997 
  44. A. R. Beresford and F. Stajano, 'Mix zones: User privacy in location­aware services,' in Proc. PerSec 2004, Mar. 2004, pp. 127-131 
  45. 3GPP TR 22.934 v6.2.0, 'Feasibility study on 3GPP system to WLAN interworking (Release 6),' Sept. 2002 

이 논문을 인용한 문헌 (1)

  1. Kim, Gwan-Yeon ; Hwang, Zi-On ; Kim, Yong ; Uhm, Yoon-Sik ; Park, Se-Hyun 2007. "A Study of Pervasive Roaming Services with Security Management Framework" 情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, 17(4): 115~129 


원문 PDF 다운로드

  • ScienceON :

원문 URL 링크

원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다. (원문복사서비스 안내 바로 가기)

상세조회 0건 원문조회 0건

DOI 인용 스타일