On balance between security and performance for LTE wireless networks

The deployment of security measures and the provision of quality of service represents two critical and tightly coupled challenges in the design and operation of network services, architectures, and protocols in today's converged communication networks. Security and performance are not necessar...

Full description

Saved in:
Bibliographic Details
Published in2012 22nd International Conference on Computer Theory and Applications (ICCTA) pp. 60 - 65
Main Authors Youssef, K. Y., Kamel, H., Hafez, A. A., Zekry, A. H. A.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.10.2012
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The deployment of security measures and the provision of quality of service represents two critical and tightly coupled challenges in the design and operation of network services, architectures, and protocols in today's converged communication networks. Security and performance are not necessarily proportional to each other. It is common that; high security measures lead to high reliability results. However over-dimensioned security measures can adversely affect the networks performance and thus the services' quality of experience. For example a lightweight security algorithm may represent a security breach to an Ecommerce application. On the other hand, heavyweight algorithm could impact negatively the service performance. This paper presents a dynamic security system architecture that weighs the trade-off between resources, costs and risks for tuning the network security profile to optimize the performance of communication networks. The paper explores a framework to define the network security profile concept and identify its usage for security analysis and vulnerability assessment for enhancing the networks' performance. A simulation model is developed using OPNET to ground the model analytics under heavy load conditions.
AbstractList The deployment of security measures and the provision of quality of service represents two critical and tightly coupled challenges in the design and operation of network services, architectures, and protocols in today's converged communication networks. Security and performance are not necessarily proportional to each other. It is common that; high security measures lead to high reliability results. However over-dimensioned security measures can adversely affect the networks performance and thus the services' quality of experience. For example a lightweight security algorithm may represent a security breach to an Ecommerce application. On the other hand, heavyweight algorithm could impact negatively the service performance. This paper presents a dynamic security system architecture that weighs the trade-off between resources, costs and risks for tuning the network security profile to optimize the performance of communication networks. The paper explores a framework to define the network security profile concept and identify its usage for security analysis and vulnerability assessment for enhancing the networks' performance. A simulation model is developed using OPNET to ground the model analytics under heavy load conditions.
Author Zekry, A. H. A.
Kamel, H.
Hafez, A. A.
Youssef, K. Y.
Author_xml – sequence: 1
  givenname: K. Y.
  surname: Youssef
  fullname: Youssef, K. Y.
  email: Khalid_youssif@yahoo.com
  organization: Strategic Ind. Dept., Alcatel-Lucent, Vélizy, France
– sequence: 2
  givenname: H.
  surname: Kamel
  fullname: Kamel, H.
  email: h.kamel@ictps.com
  organization: Network Planning & Eng., Pakistan Mobile Comm., Islamabad, Pakistan
– sequence: 3
  givenname: A. A.
  surname: Hafez
  fullname: Hafez, A. A.
  email: aabdelhafez@gmail.com
  organization: Electron. & Commun. Dept., Mil. Tech. Coll., Cairo, Egypt
– sequence: 4
  givenname: A. H. A.
  surname: Zekry
  fullname: Zekry, A. H. A.
  email: aaazekry@hotmail.com
  organization: Fac. of Eng., Electron. & Commun. Dept., Ain Shams Univ., Cairo, Egypt
BookMark eNpFT8tKw0AUHVFB-_gB3cwPJM6dd5YlxFoIdBPXZZLcQGo6KTOR0r83aMHVeXDOgbMgD370SMgLsBSAZW-7PK82KWfAU624UNLekQVIbQS3XIr7fyHUE1nHeGSMzU1trHkmxd7T2g3ON0hrnC6InkZsvkM_XanzLT1j6MZw-g3MhJZVQS99wAFjpH5ujOErrshj54aI6xsuyed7UeUfSbnf7vJNmfRg1JQ4QFAz41bKVkimOHZSWQsaLXDmnBGCWcllprWAGhm2qtMw2xlvEBqxJK9_uz0iHs6hP7lwPdxuix994Ewn
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCTA.2012.6523548
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1467328243
9781467328227
9781467328241
1467328227
EndPage 65
ExternalDocumentID 6523548
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-a1e151752844d34052ef458816e8120aa7330842496631be0ed5f61a7392ce1c3
IEDL.DBID RIE
ISBN 1467328235
9781467328234
IngestDate Wed Jun 26 19:23:44 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-a1e151752844d34052ef458816e8120aa7330842496631be0ed5f61a7392ce1c3
PageCount 6
ParticipantIDs ieee_primary_6523548
PublicationCentury 2000
PublicationDate 2012-Oct.
PublicationDateYYYYMMDD 2012-10-01
PublicationDate_xml – month: 10
  year: 2012
  text: 2012-Oct.
PublicationDecade 2010
PublicationTitle 2012 22nd International Conference on Computer Theory and Applications (ICCTA)
PublicationTitleAbbrev ICCTA
PublicationYear 2012
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001106787
Score 1.5438433
Snippet The deployment of security measures and the provision of quality of service represents two critical and tightly coupled challenges in the design and operation...
SourceID ieee
SourceType Publisher
StartPage 60
SubjectTerms 4G performance
LTE
Network Performance
Security
Wireless Network Performance
Title On balance between security and performance for LTE wireless networks
URI https://ieeexplore.ieee.org/document/6523548
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED21nWDho0V8ywMjSePEtZMRVa0KosDQSt0q27lICJRWNF349ZyTtAXEwOZYTmTZUu6d_d47gBuhM9RhRsiNU4oibISeid2FY0LYxIZGR6WKf_wkR1PxMOvNGnC71cIgYkk-Q981y7v8dGHX7qisKylrIoTdhKZKkkqrtTtPcV5osSq1W9I50NDQjaVT_Sw2opkg6d73-5M7x-wK_fqrP8qrlNFleADjzbwqUsmbvy6Mbz9_WTb-d-KH0Nnp-NjLNkIdQQPzY9j_ZkHYhsFzzoyjN9LQmrPFVnVNO6bzlC13ygJGDfY4GTDnb_xOv0iWVyTyVQemw8GkP_Lq0greK-GFwtMcKdSrHgUnkUYE2kLMnGaVS6SIH2itoiiIBeVmhEi4wQDTXiY5dSehRW6jE2jlixxPgWlrUimVURgrEdNbxnCrsiDLeGoIjJ1B2y3IfFm5Z8zrtTj_u_sC9tymVHS5S2gVH2u8orBfmOtyv78A5ASnRg
link.rule.ids 310,311,783,787,792,793,799,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMgALHy3iGw-MJI3z4aQjqlq10BaGVOpW2c5FQqC0ounCr-ecpC0gBjbHciLLlnLv7PfeAdz5MkXppoTcOKUovvbQUpG5cGwTNtGukl6h4h-NRX_iP06DaQ3uN1oYRCzIZ2ibZnGXn8z1yhyVtQRlTYSwd2CXcHUkSrXW9kTFuKFFYaHeEsaDhgavTZ2qZ38tm3HarUGnEz8YbpdrV9_9UWCliC-9QxitZ1bSSt7sVa5s_fnLtPG_Uz-C5lbJx142MeoYapidwME3E8IGdJ8zpgzBkYZWrC22rKraMZklbLHVFjBqsGHcZcbh-J1-kiwraeTLJkx63bjTt6riCtYrIYbckhwp2IcBhSc_8Qi2uZga1SoXSDHfkTL0PCfyKTsjTMIVOpgEqeDU3XY1cu2dQj2bZ3gGTGqVCBGqEKPQj-gtpbgOUydNeaIIjp1DwyzIbFH6Z8yqtbj4u_sW9vrxaDgbDsZPl7BvNqgkz11BPf9Y4TWBgFzdFHv_BdkqqpE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+22nd+International+Conference+on+Computer+Theory+and+Applications+%28ICCTA%29&rft.atitle=On+balance+between+security+and+performance+for+LTE+wireless+networks&rft.au=Youssef%2C+K.+Y.&rft.au=Kamel%2C+H.&rft.au=Hafez%2C+A.+A.&rft.au=Zekry%2C+A.+H.+A.&rft.date=2012-10-01&rft.pub=IEEE&rft.isbn=9781467328234&rft.spage=60&rft.epage=65&rft_id=info:doi/10.1109%2FICCTA.2012.6523548&rft.externalDocID=6523548
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467328234/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467328234/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467328234/sc.gif&client=summon&freeimage=true