A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A lightweight reconfigurable security mechanism for 3G/4G mobile devices
IEEE Wireless Communications
Lightweight security for mobile commerce transactions
Computer Communications
Security in third Generation Mobile Networks
Computer Communications
Securing the wireless internet
IEEE Communications Magazine
On demand network-wide VPN deployment in GPRS
IEEE Network: The Magazine of Global Internetworking
A network-assisted mobile VPN for securing users data in UMTS
Computer Communications
End-to-end security and seamless handover solution for real-time communications over 3G networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Hi-index | 0.00 |
Three alternative schemes for secure Virtual Private Network (VPN) deployment over the Universal Mobile Telecommunication System (UMTS) are proposed and analyzed. The proposed schemes enable a mobile node to voluntarily establish an IPsec-based secure channel to a private network. The alternative schemes differ in the location where the IPsec functionality is placed within the UMTS network architecture (mobile node, access network, and UMTS network border), depending on the employed security model, and whether data in transit are ever in clear-text, or available to be tapped by outsiders. The provided levels of privacy in the deployed VPN schemes, as well as the employed authentication models are examined. An analysis in terms of cost, complexity, and performance overhead that each method imposes to the underlying network architecture, as well as to the mobile devices is presented. The level of system reliability and scalability in granting security services is presented. The VPN management, usability, and trusted relations, as well as their behavior when a mobile user moves are analyzed. The use of special applications that require access to encapsulated data traffic is explored. Finally, an overall comparison of the proposed schemes from the security and operation point of view summarizes their relative performance.