Voice over IP in Wireless Heterogeneous Networks: Signaling, Mobility and Security / Edition 1 available in Hardcover
- Pub. Date:
- Springer Netherlands
The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separately in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially with the deployment of wireless heterogeneous systems, both speech and data traffic are carried over wireless links by the same IP-based packet-switched infrastructure. However, this combination faces some challenges due to the inherent properties of the wireless network. The requirements for good quality VoIP communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality. The focus of Voice over IP in Wireless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling prools used to set up an authorized VoIP session and to the disruption caused by the user mobility during the session. Voice over IP in Wireless Heterogeneous Networks thus investigates and proposes cross-layer techniques for realizing time-efficient control mechanisms for VoIP: signaling, mobility and security.
About the Author
Hanane Fathi received her M.S. in Electrical Engineering and her Ph.D. in Wireless Communications Engineering from Aalborg University, Denmark, in 2002 and 2006 respectively. She also holds a M. S. in Information Technology from Ecole Centrale d'Electronique, Paris, France. She visited Imai laboratory at the University of Tokyo, Japan, from October 2004 to March 2005. From 2006 to 2008, she worked as a research scientist at the Research Center for Information Security (RCIS) at the National Institute of Advanced Industrial Science and Technology (AIST), Japan. Currently, she is a assistant research Professor at Aalborg University, Denmark. Her research interests include network security, wireless communications security, anonymous communication, privacy and network coding.
Shyam Chakraborty is Reader in wireless technology at University of Ulster and located at the Magee Campus. He received his M. Tech. from IIT Delhi and Licenciate and Doctor of Technology degrees from Helsinki University of Technology. He was the recipient of Academy Research Fellowship of academy of Finland (2000-2004). He was also with Ericsson Corporate Research (2005-2007). His research interests are architecture of IP based wireless networks; modelling and analysis of prools; reliable and secure communications; VoIP and IMS over wireless systems etc.
Prof. Ramjee Prasad is editor-in-chief of the Wireless Personal Communications journal and he has published over 20 academic books in the field of Wireless Communications. He was series advisor with Artech House though now publishes his books for Springer and also Wiley.
Table of Contents
About Authors. Acknowledgements. Preface.
1 Introduction. 1.1 Quality of Experience: Signalling, Mobility and Security. 1.2 Challenges due to the Wireless Link. 1.3 Book Outline. References.
2 IP-based Wireless Heterogeneous Networks. 2.1 Introduction. 2.2 IEEE 802.11 Wireless Local Area Networks. 2.3 IEEE 802.16 Wireless Metropolitan Area Networks. 2.4 3GPP Cellular Systems. 2.5 Integration of WLAN, WMAN and GPRS/UMTS. 2.6 The IP-based Multimedia Subsystem. References.
3 Voice over Internet Prool. 3.1 Requirements. 3.2 Media Session. 3.3 Signalling Prools for VoIP. 3.4 VoIP Session Setup in the IMS. References.
4 Models for Performance Analysis in Wireless Networks. 4.1 Introduction. 4.2 Analytical Model for Random Error Process. 4.3 Analytical Model for Correlated Error Process. References.
5 Impact of Security on Real-time Services: Link Layer Authentication Delay in WLAN 802.11b. 5.1 Introduction. 5.2 Security Properties. 5.3 Cryptographic Primitives. 5.4 WLAN 802.11b Security. 5.5 Security Analysis of Link Layer Authentication Prools. 5.6 Link Layer Authentication Delay Analysis. 5.7 Evaluation of Link Layer Authentication Delay. 5.8 Concluding remarks. References.
6 Impact of Signalling on Real-time Services: SIP Session Setup Delay. 6.1 Introduction. 6.2 SIP Reliability Mechanisms. 6.3 Session Setup Delay. 6.4 Evaluation of SIP Session Setup Delay over Random Error Channels. 6.5 Evaluation of SIP Session Setup Delay over Correlated Fading Channels. 6.6 Optimization of SIP Session Setup Delay. 6.7 Concluding remarks. References.
7 Impact of Mobility on Real-time Services: Handover Delay. 7.1 Introduction. 7.2 Network Layer Mobility Prools. 7.3 Reliability Mechanisms for Mobile IP-based Prools. 7.4 Analysis and Optimization of Handover Delay for MIP-based Prools. 7.5 Results of Handover Delay. 7.6 Concluding remarks. References.
8 Coupling Mobility and Security. 8.1 Introduction. 8.2 Mobile IPv6 Security. 8.3 Leakage-Resilient Authenticated Key Establishment Prool based on RSA. 8.4 Leakage-Resilient Security Architecture proposal for MIPv6. 8.5 Analysis of Handover Delay for Proposed Architecture. 8.6 Security Analysis. 8.7 Results for Handover Delay. 8.8 Concluding remarks. References.
9 Towards Quality of Experience and Future Perspectives. 9.1 Towards Quality of Experience. 9.2 Future Perspectives. References.