scholarly journals Analysis of Security of QoS in WiMAX and Mobile Networks

2020 ◽  
pp. 124-132
Author(s):  
Adis Rahmanović ◽  
Muzafer Saracević

In this paper we discuss several elements of importance for securing QoS in multimedia networks. Firstly, we present the first factor, which refers to understanding the characteristics of multimedia traffic in order to define and implement the QoS requirements. Secondly, factor refers to translation between QoS parameters that implies the distribution of system and network resources, and thirdly the factor establishes the appropriate QoS architecture that can provide the required QoS guarantees for multimedia applications. We have been analyzing security-critical applications such as remote operation, which may require a guaranteed level of availability (hard QoS). There are basically two ways to secure a guaranteed QoS. The first is simply to provide a lot of resources, enough to meet the expected peak (peak) requirements with a significant security margin. This approach generously oversupplies the (over provisioning) network. We gave a detailed security analysis as features of WiMAX. More precisely, our analysis is based on the claim that its key feature of the WiMAX network is that the security layer is built into the protocol leg instead of being added later, i.e. the security layer is complex between PHY and MAC layers.

Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Moustafa M. Nasralla ◽  
Iván García-Magariño ◽  
Jaime Lloret

The last decade has witnessed a steep growth in multimedia traffic due to real-time content delivery such as in online games and video conferencing. In some contexts, MANETs play a key role in the hyperconnectivity of everything in multimedia services. In this context, this work proposes a new scheduling approach based on context-aware mobile nodes for their connectivity. The contribution relies on reporting not only the locations of devices in the network but also their movement identified by sensors. In order to illustrate this approach, we have developed a novel agent-based simulator called MASEMUL for illustrating the proposed approach. The results show that a movement-aware scheduling strategy defined with the proposed approach has decreased the ratio of channel interruptions over another common strategy in mobile networks.


2011 ◽  
Vol 34 (2) ◽  
pp. 432-442 ◽  
Author(s):  
Frank A. Zdarsky ◽  
Sebastian Robitzsch ◽  
Albert Banchs

2011 ◽  
Vol 7 (3) ◽  
pp. 217-239 ◽  
Author(s):  
Francesco Palmieri ◽  
Ugo Fiore ◽  
Aniello Castiglione

Wireless networks are more and more popular in our life, but their increasing pervasiveness and widespread coverage raises serious security concerns. Mobile client devices potentially migrate, usually passing through very light access control policies, between numerous and heterogeneous wireless environments, bringing with them software vulnerabilities as well as possibly malicious code. To cope with these new security threats the paper proposes a new active third party authentication, authorization and security assessment strategy in which, once a device enters a new Wi-Fi environment, it is subjected to analysis by the infrastructure, and if it is found to be dangerously insecure, it is immediately taken out from the network and denied further access until its vulnerabilities have been fixed. The security assessment module, that is the fundamental component of the aforementioned strategy, takes advantage from a reliable knowledge base containing semantically-rich information about the mobile node under examination, dynamically provided by network mapping and configuration assessment facilities. It implements a fully automatic security analysis framework, based on AHP, which has been conceived to be flexible and customizable, to provide automated support for real-time execution of complex security/risk evaluation tasks which depends on the results obtained from different kind of analysis tools and methodologies. Encouraging results have been achieved utilizing a proof-of-concept model based on current technology and standard open-source networking tools.


Sign in / Sign up

Export Citation Format

Share Document