The goal of Unlicensed Mobile Access (UMA) is to provide seamless access to GSM and GPRS mobile service networks via unlicensed spectrum technologies, including Bluetooth, WiMAX, and Wi-Fi. Expanding on the level of knowledge in this growing field, <b>Unlicensed Mobile Access Technology: Protocols,
Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications
β Scribed by Yan Zhang, Laurence T. Yang, Jianhua Ma
- Publisher
- Auerbach Publications
- Year
- 2008
- Tongue
- English
- Leaves
- 390
- Series
- Wireless Networks and Mobile Communications
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The goal of Unlicensed Mobile Access (UMA) is to provide seamless access to GSM and GPRS mobile service networks via unlicensed spectrum technologies, including Bluetooth, WiMAX, and Wi-Fi. Expanding on the level of knowledge in this growing field, Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards, and Applications presents the first complete cross-referenced resource exploring UMA and UMA-relevant technologies.When operating successfully, the technology supporting dual-mode enabled mobile terminals allows subscribers to roam freely and seamlessly between cellular networks. However, various technical challenges still occasionally impede clear communication. This book explores the complex issue of mobility management and emphasizes the need for intelligently designed vertical and horizontal handoff algorithms that will improve adaptability in heterogeneous wireless environments. In addition, it reviews the various strategies to guarantee Quality-of- Service (QoS) during movement and handoff.The first chapters introduce the basic technology of these systems and discuss QoS, resource management, mobility management, and security issues in UMA technology. The middle section concentrates on protocols and security challenges in UMA-related technologies, which include Bluetooth, WirelessPAN, Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16). The final chapters present standard specifications and various applications.Comprised of contributions from world-wide experts, this book is a complete reference, offering guidance on all aspects of the technical and practical issues in UMA technology.
β¦ Table of Contents
cover.jpg......Page 1
au5537_c000.pdf......Page 2
UNLICENSED MOBILE ACCESS TECHNOLOGY: Protocols, Architecture, Security, Standards and Applications......Page 3
Contents......Page 5
Preface......Page 7
Editors......Page 9
Contributors......Page 11
PART I: ARCHITECTURES......Page 14
CONTENTS......Page 15
1.1 UMA: Brief History and Evolution......Page 16
1.1.2 UMA Services......Page 17
1.1.3 Benefits of UMA for Mobile Operators and Service Providers Benefit......Page 19
1.2.1 Different UMA Threats and Possible Attacks......Page 20
1.2.2 UMA Security Requirements......Page 21
1.3.1.1 Protecting UMA......Page 22
1.3.1.3 Data Encryption......Page 24
1.3.2 Security Gateways: Proprietary Solutions......Page 25
1.3.2.2 Reef Point UMA Security Gateway......Page 26
1.4.1 Impact of Open Platforms......Page 27
1.5 Conclusion and Outlook......Page 28
REFERENCES......Page 29
CONTENTS......Page 30
2.2 Seamless Convergence: Long-Term Vision......Page 31
2.2.3 Core Network Convergence......Page 32
2.2.4 Application Server Level Convergence......Page 33
2.3.1 Seamless Converged Communication across Networks......Page 34
2.3.2 Unlicensed Mobile Access......Page 35
2.3.3.1 I-WLAN Architecture......Page 36
2.3.3.3 I-WLAN Evolution: Release 7......Page 37
2.3.4.2 MIH Functional Components......Page 38
2.4 Limits and Potential of Seamless Convergence Solutions......Page 40
2.5 Conclusion......Page 41
REFERENCES......Page 43
CONTENTS......Page 45
3.1 Introduction......Page 46
3.2.1 Overview......Page 47
3.2.2 Internet QoS......Page 48
3.2.3 Quality of Service in Cellular Networks......Page 49
3.2.4 Quality of Service in Wireless LANs......Page 50
3.2.5 Policy-Based QoS Management......Page 51
3.2.6 QoS Management for Heterogeneous Mobile Networks......Page 52
3.3.1 GAN Architecture Overview......Page 53
3.4 QoS Management in UMA......Page 54
3.4.1 Support for QoS......Page 55
3.4.2 QoS Architecture......Page 56
3.5 Conclusion and Open Issues......Page 57
REFERENCES......Page 58
CONTENTS......Page 60
4.1 Challenges for Radio Resource Management in UMA Networks......Page 61
4.2 Radio Resource Management Tuning Parameters......Page 63
4.2.1 Transmit Power Selection......Page 64
4.2.2 Carrier Sense Threshold Selection......Page 66
4.2.3 Transmit Rate Selection......Page 67
4.2.4 Station Assignment......Page 69
4.2.5 Channel Selection......Page 70
4.2.6 Access Point Placement......Page 73
4.3.1.2 Centralized versus Decentralized......Page 74
4.3.2.1 Centralized Architectures Using the CAPWAP Protocol......Page 75
4.4.1 IEEE 802.11h: Spectrum Management......Page 77
4.4.2 IEEE 802.11k: Radio Resource Measurements......Page 78
4.5 Conclusions and Open Research Issues......Page 79
REFERENCES......Page 80
CONTENTS......Page 83
5.1.1 Tragic End of WEP......Page 84
5.2.1 Port-Based Network Access Control......Page 86
5.2.2 Mutual Authentication......Page 88
5.2.3 Key Hierarchy......Page 89
5.2.4 Key Management......Page 90
5.2.5 Confidentiality and Integrity......Page 91
5.2.7 Summary of the RSN Connection Process......Page 92
5.2.8 Cost of IEEE 802.11i......Page 94
5.3.1 Attacks on IEEE 802.11 Availability......Page 96
5.3.2 Wireless ARP Spoofing Attack......Page 98
5.3.3 Evil Twin Attack......Page 99
5.3.5 Conclusion and Open Issues......Page 100
REFERENCES......Page 101
CONTENTS......Page 103
6.1 Introduction......Page 104
6.2.1 Standard GERAN Protocols......Page 105
6.2.3 Standard IP-Based Protocols......Page 106
6.2.4.1 UMA-RR......Page 108
6.3.1 Discovery and Registration Procedure......Page 109
6.3.3 Mobile-Originated Speech Call......Page 111
6.3.4 Mobile-Terminated Speech Call......Page 113
6.3.5 Handover from GERAN to UMAN......Page 115
6.3.6 Handover from UMAN to GERAN......Page 118
6.3.7.2 Packet Paging for Circuit Mode Service......Page 120
6.3.8 UMAβUMA Handover (Non-Normative)......Page 121
6.4.1 Interworking Model for UMAN and Cellular Networks......Page 122
6.4.3.1 UNC......Page 123
6.4.4.1.2 Packet Data Performance Results......Page 124
6.6 Conclusions......Page 125
Abbreviations......Page 126
REFERENCES......Page 127
PART II: PROTOCOLS AND SECURITY......Page 129
CONTENTS......Page 130
7.1 Introduction......Page 131
7.2.1 Related Work......Page 133
7.2.2 Location-Based Vertical Handover Decision Algorithm......Page 135
7.2.3 Summary......Page 136
7.3.1.1 Network Layer Solution......Page 137
7.3.1.2 Transport Layer Solution......Page 138
7.3.1.3 Application Layer Solution......Page 139
7.3.2 Seamless SIP-Based Handover Scheme......Page 140
7.4 Admission Control on Vertical Handover......Page 142
7.4.1 Related Work......Page 143
7.4.2.1 System Model......Page 144
7.4.2.3 Traffic Equations......Page 145
7.4.2.4 Numerical Results......Page 147
7.4.3 Summary......Page 148
7.5 Conclusion......Page 149
REFERENCES......Page 150
CONTENTS......Page 153
8.1 Basics of the IEEE 802.15.3 HR-WPAN Standard......Page 154
8.2.1 MasterβSlave Bridge......Page 156
8.2.3 Challenges......Page 158
8.3 Implementing Mesh Networks with 802.15.3......Page 159
8.3.3 Channel Scheduling......Page 160
8.4 Related Work......Page 162
8.5 Experimental Results......Page 163
REFERENCES......Page 166
CONTENTS......Page 168
9.1.2 IEEE 802.11 MAC Layer......Page 169
9.1.2.1 Carrier Sense Multiple Access with Collision Avoidance......Page 170
9.1.2.2 Inter-Frame Space......Page 171
9.1.2.3 Distributed Coordination Function......Page 172
9.1.2.4 Point Coordination Function......Page 173
9.1.3.1 Enhanced Distributed Channel Access......Page 174
9.1.3.2 HCF Controlled Channel Access......Page 177
9.1.4 Current Challenges and Enhancements......Page 178
9.2.1.1.1 PMP Mode......Page 179
9.2.1.2 Addressing and Connections......Page 181
9.2.1.3 Data and Scheduling Services......Page 182
9.2.1.3.1 Uplink Request/Grant Scheduling......Page 183
9.2.1.4 Bandwidth Allocation and Request Mechanisms......Page 184
9.2.2 IEEE 802.16 QoS Architecture......Page 185
9.2.2.2 Dynamic Service Flow Establishment......Page 186
9.2.2.3 Activation Model......Page 187
9.2.3 Undefined QoS Requirements, Challenges, and Enhancements......Page 188
REFERENCES......Page 189
CONTENTS......Page 191
10.2.1 Scanning......Page 192
10.2.2 Authentication......Page 193
10.2.3 Reassociation and Association......Page 194
10.3.1.1 Full Scanning......Page 195
10.3.1.2 Selective Scanning......Page 196
10.3.2 Bypass Scanning......Page 197
10.3.4 Channel Masks and AP Caching Schemes......Page 198
10.3.5 NG and NG-Pruning Schemes......Page 199
10.4 FastHandoff Schemes to Reduce Re-AuthenticationDelays......Page 202
10.4.2 Proactive Key Distribution Schemes......Page 203
10.4.3 Predictive Authentication Scheme......Page 205
10.5 Handoff-Related Open Research Challenges......Page 206
REFERENCES......Page 207
CONTENTS......Page 211
11.1.1 IEEE 802.11 Introduction......Page 212
11.2.1 Different Types of Attackers......Page 214
11.2.2 Different Types of Attacks......Page 215
11.2.4 WEP Overview and Pitfalls......Page 217
11.2.5 Attacks on WEP......Page 218
11.3.1 IEEE 802.11i, WPA, and RSN......Page 219
11.3.2 Authentication Process......Page 220
11.3.3.1 Secret-Key Approach......Page 221
11.3.3.2 Public-Key Approaches......Page 224
11.3.3.3 Tunneled Approaches......Page 225
11.4 Authentication in the Cellular World......Page 227
11.5 Summary and Open Issues......Page 229
REFERENCES......Page 230
CONTENTS......Page 232
12.1 Introduction......Page 233
12.2.1 Interference between Wireless Systems Operating in License-Exempt Bands......Page 234
12.3.1 MAC Layer......Page 235
12.4 Distributed Algorithms for Interference Mitigation in 802.16 Systems......Page 236
12.4.1 BS Algorithms......Page 238
12.5 System Performance Evaluation......Page 240
12.5.1 Simulator......Page 241
12.5.2 Results and Discussion......Page 242
REFERENCES......Page 249
CONTENTS......Page 251
13.1 Introduction......Page 252
13.2 MANET Environments and QoS......Page 253
13.3 Applicability of Traditional QoS Models to MANETs......Page 255
13.3.1 Integrated Services......Page 256
13.3.4 Traffic Engineering and Constraint-Based Routing......Page 257
13.4 General QoS Support in MANETs......Page 258
13.4.1.2 QoS Support in Link Layer......Page 259
13.4.1.3 QoS Support in Network Layer......Page 261
13.4.1.5 QoS Support in Application Layer......Page 262
13.4.2.1 FQMM......Page 263
13.4.2.2 WMPLS......Page 264
13.4.2.3.1 INSIGNIA......Page 265
13.5 QoS Routing in MANETs......Page 266
13.5.1 Routing Protocols for MANETs without QoS Support......Page 267
13.5.2 Routing Protocols for MANETs with QoS Support......Page 268
13.5.2.1 CEDAR......Page 269
13.5.2.3 Enhanced Ticket-Based Routing......Page 270
13.5.2.6 AODV with QoS Extensions (QAODV)......Page 271
13.5.2.7 QOLSR......Page 272
13.5.2.8 WARP......Page 273
13.5.2.9 Ad Hoc QoS Multicast......Page 274
13.6.2 dRSVP......Page 275
13.7 Conclusions and Open Issues......Page 276
REFERENCES......Page 277
PART III: STANDARDS AND APPLICATIONS......Page 281
CONTENTS......Page 282
14.1 Introduction......Page 283
14.2.1 OFDMA......Page 284
14.3 MAC Layer......Page 285
14.4.1 Smart Antennas......Page 286
14.5 WiMAX Architecture......Page 287
14.6.1 Security......Page 288
14.6.2 WiMAX Quality of Service......Page 289
14.6.3 Mobility Management......Page 290
14.7.1 Scenarios......Page 291
14.7.2 WiMAX Applications......Page 292
14.8.2 WiBro......Page 293
14.9 Conclusion......Page 294
Abbreviations......Page 295
REFERENCES......Page 296
CONTENTS......Page 297
15.1 Motivation and Rationale......Page 298
15.2 Overview......Page 301
15.3 DSRC Applications......Page 302
15.4.1 DSRC Building Blocks......Page 303
15.4.2 Reference Model......Page 304
15.4.3.2 WSMP Format......Page 305
15.5 WAVE MAC Services......Page 306
15.5.1.1 Channel Selector......Page 308
15.5.2 Channel Coordination......Page 309
15.5.2.1 Channel Coordination Function......Page 310
15.5.2.3 Common Time Base Estimation......Page 311
15.5.3 WAVE Communication Types......Page 312
15.5.3.2 WAVE Communication Service Types......Page 313
15.5.3.3 WBSS Initiation and Operations......Page 314
15.5.3.5 Changing WBSS Services......Page 315
15.6.1 Use of Portal Function......Page 316
15.6.2 IPv6 Neighbor Cache......Page 317
15.7.1 Application Registration and Removal......Page 318
15.7.2 WBSS Management......Page 319
15.7.5 Application Status Transition and Maintenance......Page 320
15.8 Security Considerations......Page 321
REFERENCES......Page 322
CONTENTS......Page 324
16.1 Introduction......Page 325
16.2 UWB PHY......Page 326
16.3 MAC Protocols in IEEE 802.15.3......Page 327
16.4 Related Work......Page 328
16.5.1 System Model......Page 329
16.5.2 Exclusive Region......Page 330
16.6 Efficient Scheduling Algorithms for Throughput Maximization......Page 331
16.7 QoS Support for Heterogeneous Traffic......Page 332
16.7.2 Utility Optimization Problem......Page 333
16.7.3 Utility-Based Scheduling Algorithm......Page 336
16.7.4 Utility Update......Page 337
16.8.2 Utility versus Fairness......Page 338
16.8.2.2 Minimum Utility......Page 339
16.8.3 Algorithm Efficiency and Stability......Page 343
16.9 Conclusion and Open Issues......Page 344
REFERENCES......Page 345
CONTENTS......Page 347
17.1.1 Pervasive Technologies and Unlicensed Mobile Access Technology......Page 349
17.2.1.1 Seed Oppnets and Oppnet Helpers......Page 350
17.2.1.2 Growth of Seed Oppnet into Expanded Oppnet......Page 352
17.2.1.3 Asking or Ordering Helpers and Oppnet Reserve......Page 353
17.2.2 Control Flow in Oppnets......Page 354
17.2.3 Oppnet Virtual Machine: Standard Implementation Framework for Oppnet Applications......Page 355
17.2.3.1 Using OVM Primitives in Oppnet Application Scenarios......Page 358
17.2.4 Example Oppnet Applications and Use Scenarios......Page 359
17.2.4.1 Characteristics of Oppnet-Based Applications......Page 360
17.2.4.2.1 Emergency Applications......Page 361
17.2.4.2.3 Benevolent and Malevolent Oppnet Applications......Page 362
17.2.4.3.2 Malevolent Oppnet Scenario: Bad Guys Gang Up......Page 363
17.3.1.2 Grid Computing......Page 364
17.3.1.3 Wireless Sensor Networks (Sensornets)......Page 365
17.3.1.6 Ambient Networks......Page 366
17.3.1.8 Class 1 Opportunistic Networks......Page 367
17.4.1 Overview of the MicroOppnet......Page 368
17.4.2 Design of MicroOppnet......Page 378
17.4.3 Implementation Details for the MicroOppnet......Page 380
17.4.4 Sample Application Scenario for the MicroOppnet......Page 381
17.5 Conclusion......Page 382
17.6 Acknowledgments......Page 383
17.A.2.1 Primitives for Discovery and Identification of Oppnet-Enabled Devices......Page 384
17.A.2.3 Primitives for Managing Workload......Page 385
17.A.3.2 Primitives for Accepting or Assigning Oppnet Tasks......Page 386
17.A.3.4 Primitives for Quitting Oppnet......Page 387
17.A.4.4 Primitives for Quitting Oppnet......Page 388
REFERENCES......Page 389
π SIMILAR VOLUMES
The widespread availability of mobile devices coupled with recent advancements in networking capabilities make opportunistic networks one of the most promising technologies for next-generation mobile applications. Are you ready to make your mark? Featuring the contributions of prominent researcher
<p>This important text/reference presents the latest research and developments in the field of mobile payment systems (MPS), covering issues of mobile device security, architectures and models for MPS, and transaction security in MPS. Topics and features: introduces the fundamental concepts in MPS,
Preface -- Contents -- 1 Introduction -- 1.1 Electronic Money -- 1.1.1 Advantages and Disadvantages of Electronic Money -- 1.1.2 Characteristics of Electronic Money -- 1.2 Electronic Commerce -- 1.3 Mobile Commerce -- 1.4 Mobile Payment -- 1.4.1 Mobile Payment Characteristics -- 1.4.2 Existing Mobil
Preface -- Contents -- 1 Introduction -- 1.1 Electronic Money -- 1.1.1 Advantages and Disadvantages of Electronic Money -- 1.1.2 Characteristics of Electronic Money -- 1.2 Electronic Commerce -- 1.3 Mobile Commerce -- 1.4 Mobile Payment -- 1.4.1 Mobile Payment Characteristics -- 1.4.2 Existing Mobil
Wireless networking has been around for more than a decade, but mesh is a relatively recent revolution. This book edits together extensive research from about 50 global experts into an easy-to-read, fluid and authoritative account of this emerging technology and market. The release of the 802.11 IE