Portability architecture for nomadic wireless internet access users and security performance evaluation

  • Authors:
  • Mustafa M. Matalgah;Jihad Qaddour;Omar S. Elkeelany;Khurram P. Sheikh

  • Affiliations:
  • University of Mississippi;Illinois State University;University of Missouri, Kansas City;Sprint

  • Venue:
  • Wireless communications systems and networks
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

A value added service to broadband wireless network is the remote access virtual private network (VPN). The corporate legitimate portable users can connect to their offices through a wireless network from different locations and get secure services as if they were connected to the corporate local area network. One of the main challenges is to block illegitimate wireless users' requests. Registration and authentication functions should be implemented with highly secured wireless connection, These functions are accomplished by tunnelling the user information in a secured form to the corporate authentication server through the Internet traffic. The Corporate Authentication Server then grants or denies the user access. This chapter addresses various portability scenarios, architectures, implementation, and requirement issues for portable wireless Internet access systems. Moreover, performance evaluation and comparison are presented for the state-of-the-art security and authentication techniques.