Security of the IP Packet Data Service in Wireless Networks

No Thumbnail Available

URL

Journal Title

Journal ISSN

Volume Title

Helsinki University of Technology | Diplomityö
Checking the digitized thesis and permission for publishing
Instructions for the author

Date

1997

Major/Subject

Tietokoneverkot

Mcode

Tik-110

Degree programme

Language

en

Pages

xiv + 88

Series

Abstract

The TCP/IP protocols provide data packet services on the Internet. These protocols are associated with the most popular networking applications. Today there exists an opportunity to utilize the TCP/IP protocols in wireless networks. Mobility on one hand and possibility of an access to remote sources of information on the other hand give a chance for particular groups of users to benefit from the TCP/IP network level services. Business, transportation, public safety and security are examples of application areas that can utilize the TCP/IP protocols. The TCP protocol is a part of the TCP/IP protocol stack. This protocol was developed to provide a reliable transport service over unreliable networks. Unfortunately TCP was designed without taking into consideration the problems associated with future narrowband cellular netwoks. Nevertheless the TCP protocol can be utilized in wireless networks as such, but certain modifications of TCP allow to meet the low bandwidth requirement more optimally. One of the modified TCP protocols is called the Transaction TCP (T/TCP) protocol. At minimum, it sends only three segments to perform a reliable transaction as compare with at least nine segments of standard TCP. The main problem associated with TCP/IP is concerning its security. As TCP/IP security had been identified as a problem on the Internet, a number of protocols was developed to compensate the security shortcoming of existing TCP/IP. These protocols are usually inserted in the TCP/IP stack between the application and the transport layers. They use TCP/IP to negotiate security parameters on behalf of other applications, and thus introduce an additional traffic prior to a normal data exchange. In contrast to these approaches, this work proposes a concept of Transaction TCP protocol with integrated security functions and suggests further extensions of this protocol. The new secure Transaction TCP protocol avoids a negotiation of compression and encryption algorithms by employing standard methods. This protocol is not intended for interoperability with conventional TCP, but its implementation can support TCP by switching the security functions off manually or otherwise.

Description

Supervisor

Karila, Arto

Thesis advisor

Nieminen, Seppo

Keywords

security, TCP/IP, TETRA, transaction, Windows NT

Other note

Citation