Abstract

Over the last couple of years, many heterogeneous wireless access technologies have emerged and they have become an integral part of the Internet. In particular, we have experienced an explosive growth in the use of Wireless Local Area Networks (WLANs) and cellular networking technologies (such as Code Division Multiple Access (CDMA), Universal Mobile Telecommunication System (UMTS), General Packet Radio Service (GPRS)). High mobility of wireless users requires that the underlying heterogeneous network infrastructure provides uninterrupted wireless connectivity and service access anywhere, anytime. An additional requirement that is becoming increasingly important for mobile users is the ability to maintain secure connections while on the move across different wireless access technologies. There are some significant challenges (for example, fast, secure handoffs) that need to be overcome to achieve this goal because there is no single end-to-end security protocol that works across both WLANs and cellular networks. We review the various security protocols currently deployed over WLANs and cellular networks. We discuss some of the most recent research efforts on end-to-end security techniques that have been recently deployed across integrated WLAN-Cellular networks. We highlight some of the main benefits and major limitations associated with each security approach. It is hoped that the security solutions discussed will benefit other researchers and designers working to solve the challenge of providing seamless, secure service access across heterogeneous WLAN/Cellular networks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.