Security of the IP Packet Data Service in Wireless Networks
No Thumbnail Available
URL
Journal Title
Journal ISSN
Volume Title
Helsinki University of Technology |
Diplomityö
Checking the digitized thesis and permission for publishing
Instructions for the author
Instructions for the author
Authors
Date
1997
Department
Major/Subject
Tietokoneverkot
Mcode
Tik-110
Degree programme
Language
en
Pages
xiv + 88
Series
Abstract
The TCP/IP protocols provide data packet services on the Internet. These protocols are associated with the most popular networking applications. Today there exists an opportunity to utilize the TCP/IP protocols in wireless networks. Mobility on one hand and possibility of an access to remote sources of information on the other hand give a chance for particular groups of users to benefit from the TCP/IP network level services. Business, transportation, public safety and security are examples of application areas that can utilize the TCP/IP protocols. The TCP protocol is a part of the TCP/IP protocol stack. This protocol was developed to provide a reliable transport service over unreliable networks. Unfortunately TCP was designed without taking into consideration the problems associated with future narrowband cellular netwoks. Nevertheless the TCP protocol can be utilized in wireless networks as such, but certain modifications of TCP allow to meet the low bandwidth requirement more optimally. One of the modified TCP protocols is called the Transaction TCP (T/TCP) protocol. At minimum, it sends only three segments to perform a reliable transaction as compare with at least nine segments of standard TCP. The main problem associated with TCP/IP is concerning its security. As TCP/IP security had been identified as a problem on the Internet, a number of protocols was developed to compensate the security shortcoming of existing TCP/IP. These protocols are usually inserted in the TCP/IP stack between the application and the transport layers. They use TCP/IP to negotiate security parameters on behalf of other applications, and thus introduce an additional traffic prior to a normal data exchange. In contrast to these approaches, this work proposes a concept of Transaction TCP protocol with integrated security functions and suggests further extensions of this protocol. The new secure Transaction TCP protocol avoids a negotiation of compression and encryption algorithms by employing standard methods. This protocol is not intended for interoperability with conventional TCP, but its implementation can support TCP by switching the security functions off manually or otherwise.Description
Supervisor
Karila, ArtoThesis advisor
Nieminen, SeppoKeywords
security, TCP/IP, TETRA, transaction, Windows NT