loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Glenford Mapp 1 ; Mahdi Aiash 1 ; Aboubaker Lasebae 1 and Raphael Phan 2

Affiliations: 1 Middlesex University, United Kingdom ; 2 Loughborough University, United Kingdom

Keyword(s): Heterogeneous networks, Security models, Integrated security module, Open network, Multi-layer.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Mobile System Security ; Network Security ; Ubiquitous Computing Security ; Wireless Network Security

Abstract: Security for Next Generation Networks (NGN) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address the security challenges in 4G networks. This paper sheds light on our approach of providing security for the Y-Comm architecture as an example of 4G communication frameworks. Our approach proposes a four-layer security integrated module to protect data and three targeted security models to protect different network entities, thus providing security in different situations without affecting the dynamics of the 4G networks.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.15.34.50

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Mapp, G.; Aiash, M.; Lasebae, A. and Phan, R. (2010). SECURITY MODELS FOR HETEROGENEOUS NETWORKING. In Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT; ISBN 978-989-8425-18-8; ISSN 2184-3236, SciTePress, pages 318-321. DOI: 10.5220/0003032803180321

@conference{secrypt10,
author={Glenford Mapp. and Mahdi Aiash. and Aboubaker Lasebae. and Raphael Phan.},
title={SECURITY MODELS FOR HETEROGENEOUS NETWORKING},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT},
year={2010},
pages={318-321},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003032803180321},
isbn={978-989-8425-18-8},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT
TI - SECURITY MODELS FOR HETEROGENEOUS NETWORKING
SN - 978-989-8425-18-8
IS - 2184-3236
AU - Mapp, G.
AU - Aiash, M.
AU - Lasebae, A.
AU - Phan, R.
PY - 2010
SP - 318
EP - 321
DO - 10.5220/0003032803180321
PB - SciTePress