TITLE

A Secured Service Level Negotiation In Ubiquitous Environments

AUTHOR(S)
Chalouf, Mohamed Aymen; Krief, Francine
PUB. DATE
July 2009
SOURCE
International Journal of Communication Networks & Information Se;Jul2009, Vol. 1 Issue 2, p9
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The goal of the ubiquitous connectivity is to enable mobile users to be permanently and transparently connected to the Internet. These mobile users are often connected via wireless networks like Wi-Fi or WiMax and consuming services that require a high Quality of Service (QoS) level such as video on demand or voice over IP. The wireless access to these services may make the concerned communications vulnerable to security attacks because of the open medium on which these access technologies are based. Hence, in ubiquitous environments, we need to guarantee both QoS and security for mobile users' communications. In such an environment, it becomes very difficult for service providers to satisfy these users' needs. A solution is to assign a profile to each user in order to optimize and automate the process of service level negotiation which enables guaranteeing QoS and security. In this paper, we present a protocol for service level negotiation which uses Web Services and includes both QoS and security in its negotiation. Then, we propose to adapt it to ubiquitous environments by basing its processing on the user profile and by specifying collaboration with the IEEE 802.21 standard, which manages the mobility of users and participates in the creation of theirs profiles. After that, we provide the negotiation flow of this protocol with security features using WSS, SSL and IPSec. Since, these security protocols may have an impact on the negotiation protocol performances; we will also evaluate this impact. Test results and implementation aspects are also shown in this paper.
ACCESSION #
44255986

 

Related Articles

  • COMPACT DUAL BAND 1.8/3.3 GHz PLANAR MONO-POLE ANTENNAS USING TUNING MECHANISMS FOR GSM/WIMAX. Tsai, C. -L.; Yang, C. -L. // Progress in Electromagnetics Research C;Apr2012, Vol. 27, p55 

    This study is designed mainly for dual band antennas of GSM/WiMAX operation in a wireless mobile communication device. This study proposes a matching technology for single path resonance in a basic monopole antenna running in dual-mode [1] and extends to a wide tuning range. The tuning of each...

  • Does WiMax Work? Yang, Jia Lynn // Fortune International (Europe);10/27/2008, Vol. 158 Issue 7, p28 

    The article reports on WiMax from Sprint. WiMax is a wireless technology proposed to be quick like cable internet and digital subscriber line internet but with a wider range than wireless fidelity. Sprint is using the service Xohm which charges an introductory price of $30 a month for its mobile...

  • Data Stream.  // Government Technology;Jun2004 Supp, Vol. 17, p25 

    Presents statistics on the application of wireless communication systems in the U.S. as of June 2004. Density map of reported problems in mobile telephone service in New York City; Percentage of digital cellular subscribers; Factors that contributed to the increase in home usage of Wi-Fi...

  • Attack Robustness and Security Enhancement with Improved Wired Equivalent Protocol. Ahmad, S. M. K. M. Abbas; Rajan, E. G.; Govardhan, A. // International Journal of Network Security (2152-5064);Apr2012, Vol. 3 Issue 2, p42 

    With the widespread use of wireless networks, securing Data transmission becomes a basic requirement. The IEEE 802.11 standard which defines wireless networks communication, has proposed in its second version, IEEE 802.11b, a new protocol to offer some wired-like security services, such as: data...

  • THE i'S HAVE IT. Kooser, Amanda C. // Entrepreneur;Nov2004, Vol. 32 Issue 11, p59 

    Focuses on theWi-Fi standard known as 802.11i, which is aimed at shoring up some of the security problems associated with previous versions of the networking technology. Key features of the standard; Major manufacturers' implementation of the standard with a focus on business hardware first.

  • Paths to convergence. Buckley, Sean // Telecommunications - International Edition;Feb2007, Vol. 41 Issue 2, p29 

    The article reports on the response of operators to the customer demand for fixed mobile convergence (FMC) in the U.S. The promise of FMC is its ability to enable users to transfer their voice calls between the WiFi and cellular networks with consumers and business increasingly adopting WiFi to...

  • Ubiquitous Wireless Connectivity across Cellular and Wireless Local Area Networks. Siddiqui, F.; Zeadally, S. // Journal of Information Science & Engineering;Mar2008, Vol. 24 Issue 2, p327 

    Future generation wireless networks are expected to support multiple wireless access technologies, each with different access bandwidth and coverage range. Two of these technologies include Universal Mobile Telecommunications System (UMTS) and IEEE 802.11 Wireless Local Area Networks (WLANs)....

  • VoIP Technology To Use Wi-Fi To Cut Cord. Scoblete, Greg // TWICE: This Week in Consumer Electronics;7/12/2004, Vol. 19 Issue 14, p48 

    This article reports that with the rapid roll out of Voice Over Internet Protocol (VoIP) telephone service from cable providers, telecommunication firms and start-ups will use wireless Wi-Fi networking to free telephone from wired modems and wired phones in 2004. Early entrants into the market...

  • GET SMART! Kooser, Amanda C. // Entrepreneur;Jul2004, Vol. 32 Issue 7, p45 

    Suggests the wireless fidelity spots are a great convenience for traveling entrepreneurs and their employees. Ways of ensuring that the data being transmitted is safe when signing in from distant locales; Basic elements of mobile security; Companies that offer virtual private network capabilities.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics