Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lim, Sun-Hee | - |
dc.contributor.author | Yun, Seunghwan | - |
dc.contributor.author | Lim, Jongin | - |
dc.contributor.author | Yi, Okyeon | - |
dc.date.accessioned | 2021-09-08T11:09:23Z | - |
dc.date.available | 2021-09-08T11:09:23Z | - |
dc.date.created | 2021-06-11 | - |
dc.date.issued | 2009-12 | - |
dc.identifier.issn | 1229-2370 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/118852 | - |
dc.description.abstract | A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical cross-layer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | KOREAN INST COMMUNICATIONS SCIENCES (K I C S) | - |
dc.title | Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless Networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lim, Jongin | - |
dc.identifier.doi | 10.1109/JCN.2009.6388417 | - |
dc.identifier.scopusid | 2-s2.0-74549221510 | - |
dc.identifier.wosid | 000273441200012 | - |
dc.identifier.bibliographicCitation | JOURNAL OF COMMUNICATIONS AND NETWORKS, v.11, no.6, pp.634 - 644 | - |
dc.relation.isPartOf | JOURNAL OF COMMUNICATIONS AND NETWORKS | - |
dc.citation.title | JOURNAL OF COMMUNICATIONS AND NETWORKS | - |
dc.citation.volume | 11 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 634 | - |
dc.citation.endPage | 644 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART001414221 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Evaluation | - |
dc.subject.keywordAuthor | quality of protection | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | UMTS | - |
dc.subject.keywordAuthor | WiBro | - |
dc.subject.keywordAuthor | wireless | - |
dc.subject.keywordAuthor | WLAN | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.