Skip to main content

A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems

  • Conference paper
Information Security and Cryptology – ICISC 2004 (ICISC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3506))

Included in the following conference series:

Abstract

Location-aware computing is widely discussed to be one attractor of the future ubiquitous networks for intelligent home and telematics services. Apart from technical difficulties in providing accurate position information there is also a lack of a clearly defined framework how to create innovative and secure services using location information. In this paper, we identify QoS, interworking and security problems in location-aware computing. We propose a number of concepts and infrastructures for location-aware security services including micro and macro mobility management in ubiquitous home networks and heterogeneous wireless networks. We further explain how the proposed approach can be applied to seamless secure interworking among wireless LANs and 3G, 4G cellular systems. Our approach might be helpful in the discussion for the frameworks especially highlighting evolutionary steps for the next ubiquitous networks.

This research was supported by the MIC(Ministry of Information and Communication), Korea, under the Chung-Ang University HNRC(Home Network Research Center)-ITRC support program supervised by the IITA(Institute of Information Technology Assessment).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Korpip, P., et al.: Managing Context Information in Mobile Devices. IEEE Pervasive computing (July-September 2003)

    Google Scholar 

  2. Hazas, M., et al.: Location-Aware Computing Comes of Age. IEEE Computer (February 2004)

    Google Scholar 

  3. Schilit, B., et al.: Wireless Location Privacy Protection. IEEE Computer (December 2003)

    Google Scholar 

  4. Mähönen, P., et al.: Hop-by-Hop Toward Future Mobile Broadband IP. IEEE Communications Magazine (March 2004)

    Google Scholar 

  5. Vossiek, M.: Wireless Local Positioning. IEEE Microwave Magazine (December 2003)

    Google Scholar 

  6. Montavont, N., Noël, T.: Handover Management for Mobile Nodes in IPv6 Networks. IEEE Communications Magazine (August 2002)

    Google Scholar 

  7. Daniel Wong, K., et al.: Mobility Management Scheme for Auto-configured Wireless IP Networks. IEEE Wireless Communications (October 2003)

    Google Scholar 

  8. He, Q., et al.: The Quest for Personal Control Over Mobile Location Privacy. IEEE Communications Magazine (May 2004)

    Google Scholar 

  9. Gruteser, M., et al.: Protecting Privacy in Continuous Location-Tracking Applications. IEEE Security & Privacy (March-April 2004)

    Google Scholar 

  10. Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive computing (January-March 2003)

    Google Scholar 

  11. Prehofer, C., Wei, Q.: Active Networks for 4G Mobile Communication: Motivation, Architecture and Application Scenarios. In: International Working Conference on Active Networks (2002)

    Google Scholar 

  12. Location Inter-operability Forum (LIF): Mobile Location Protocol (MLP). TS 101 Specification Version 3.0.0 (June, 6 2002)

    Google Scholar 

  13. Chellappa, R., Jennings, A., Shenoy, N.: User Mobility Prediction in Hybrid and Ad Hoc Wireless Networks. ATNAC (December 2003)

    Google Scholar 

  14. Ferraiolo, D.F., et al.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security 4(3) (August 2001)

    Google Scholar 

  15. IEEE Draft 802.11i/D6.1 (September 2003)

    Google Scholar 

  16. Lee, M., Kim, J., Park, S., Lee, J., Lee, S.: A Secure Web Services for Location Based Services in Wireless Networks. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol. 3042, pp. 332–344. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, M., Kim, J., Park, S., Song, O., Jun, S. (2005). A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems. In: Park, Cs., Chee, S. (eds) Information Security and Cryptology – ICISC 2004. ICISC 2004. Lecture Notes in Computer Science, vol 3506. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11496618_29

Download citation

  • DOI: https://doi.org/10.1007/11496618_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26226-8

  • Online ISBN: 978-3-540-32083-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics