On balance between security and performance for LTE wireless networks
The deployment of security measures and the provision of quality of service represents two critical and tightly coupled challenges in the design and operation of network services, architectures, and protocols in today's converged communication networks. Security and performance are not necessar...
Saved in:
Published in | 2012 22nd International Conference on Computer Theory and Applications (ICCTA) pp. 60 - 65 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.10.2012
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The deployment of security measures and the provision of quality of service represents two critical and tightly coupled challenges in the design and operation of network services, architectures, and protocols in today's converged communication networks. Security and performance are not necessarily proportional to each other. It is common that; high security measures lead to high reliability results. However over-dimensioned security measures can adversely affect the networks performance and thus the services' quality of experience. For example a lightweight security algorithm may represent a security breach to an Ecommerce application. On the other hand, heavyweight algorithm could impact negatively the service performance. This paper presents a dynamic security system architecture that weighs the trade-off between resources, costs and risks for tuning the network security profile to optimize the performance of communication networks. The paper explores a framework to define the network security profile concept and identify its usage for security analysis and vulnerability assessment for enhancing the networks' performance. A simulation model is developed using OPNET to ground the model analytics under heavy load conditions. |
---|---|
AbstractList | The deployment of security measures and the provision of quality of service represents two critical and tightly coupled challenges in the design and operation of network services, architectures, and protocols in today's converged communication networks. Security and performance are not necessarily proportional to each other. It is common that; high security measures lead to high reliability results. However over-dimensioned security measures can adversely affect the networks performance and thus the services' quality of experience. For example a lightweight security algorithm may represent a security breach to an Ecommerce application. On the other hand, heavyweight algorithm could impact negatively the service performance. This paper presents a dynamic security system architecture that weighs the trade-off between resources, costs and risks for tuning the network security profile to optimize the performance of communication networks. The paper explores a framework to define the network security profile concept and identify its usage for security analysis and vulnerability assessment for enhancing the networks' performance. A simulation model is developed using OPNET to ground the model analytics under heavy load conditions. |
Author | Zekry, A. H. A. Kamel, H. Hafez, A. A. Youssef, K. Y. |
Author_xml | – sequence: 1 givenname: K. Y. surname: Youssef fullname: Youssef, K. Y. email: Khalid_youssif@yahoo.com organization: Strategic Ind. Dept., Alcatel-Lucent, Vélizy, France – sequence: 2 givenname: H. surname: Kamel fullname: Kamel, H. email: h.kamel@ictps.com organization: Network Planning & Eng., Pakistan Mobile Comm., Islamabad, Pakistan – sequence: 3 givenname: A. A. surname: Hafez fullname: Hafez, A. A. email: aabdelhafez@gmail.com organization: Electron. & Commun. Dept., Mil. Tech. Coll., Cairo, Egypt – sequence: 4 givenname: A. H. A. surname: Zekry fullname: Zekry, A. H. A. email: aaazekry@hotmail.com organization: Fac. of Eng., Electron. & Commun. Dept., Ain Shams Univ., Cairo, Egypt |
BookMark | eNpFT8tKw0AUHVFB-_gB3cwPJM6dd5YlxFoIdBPXZZLcQGo6KTOR0r83aMHVeXDOgbMgD370SMgLsBSAZW-7PK82KWfAU624UNLekQVIbQS3XIr7fyHUE1nHeGSMzU1trHkmxd7T2g3ON0hrnC6InkZsvkM_XanzLT1j6MZw-g3MhJZVQS99wAFjpH5ujOErrshj54aI6xsuyed7UeUfSbnf7vJNmfRg1JQ4QFAz41bKVkimOHZSWQsaLXDmnBGCWcllprWAGhm2qtMw2xlvEBqxJK9_uz0iHs6hP7lwPdxuix994Ewn |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICCTA.2012.6523548 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 1467328243 9781467328227 9781467328241 1467328227 |
EndPage | 65 |
ExternalDocumentID | 6523548 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i175t-a1e151752844d34052ef458816e8120aa7330842496631be0ed5f61a7392ce1c3 |
IEDL.DBID | RIE |
ISBN | 1467328235 9781467328234 |
IngestDate | Wed Jun 26 19:23:44 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-a1e151752844d34052ef458816e8120aa7330842496631be0ed5f61a7392ce1c3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_6523548 |
PublicationCentury | 2000 |
PublicationDate | 2012-Oct. |
PublicationDateYYYYMMDD | 2012-10-01 |
PublicationDate_xml | – month: 10 year: 2012 text: 2012-Oct. |
PublicationDecade | 2010 |
PublicationTitle | 2012 22nd International Conference on Computer Theory and Applications (ICCTA) |
PublicationTitleAbbrev | ICCTA |
PublicationYear | 2012 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001106787 |
Score | 1.5438433 |
Snippet | The deployment of security measures and the provision of quality of service represents two critical and tightly coupled challenges in the design and operation... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 60 |
SubjectTerms | 4G performance LTE Network Performance Security Wireless Network Performance |
Title | On balance between security and performance for LTE wireless networks |
URI | https://ieeexplore.ieee.org/document/6523548 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED21nWDho0V8ywMjSePEtZMRVa0KosDQSt0q27lICJRWNF349ZyTtAXEwOZYTmTZUu6d_d47gBuhM9RhRsiNU4oibISeid2FY0LYxIZGR6WKf_wkR1PxMOvNGnC71cIgYkk-Q981y7v8dGHX7qisKylrIoTdhKZKkkqrtTtPcV5osSq1W9I50NDQjaVT_Sw2opkg6d73-5M7x-wK_fqrP8qrlNFleADjzbwqUsmbvy6Mbz9_WTb-d-KH0Nnp-NjLNkIdQQPzY9j_ZkHYhsFzzoyjN9LQmrPFVnVNO6bzlC13ygJGDfY4GTDnb_xOv0iWVyTyVQemw8GkP_Lq0greK-GFwtMcKdSrHgUnkUYE2kLMnGaVS6SIH2itoiiIBeVmhEi4wQDTXiY5dSehRW6jE2jlixxPgWlrUimVURgrEdNbxnCrsiDLeGoIjJ1B2y3IfFm5Z8zrtTj_u_sC9tymVHS5S2gVH2u8orBfmOtyv78A5ASnRg |
link.rule.ids | 310,311,783,787,792,793,799,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMgALHy3iGw-MJI3z4aQjqlq10BaGVOpW2c5FQqC0ounCr-ecpC0gBjbHciLLlnLv7PfeAdz5MkXppoTcOKUovvbQUpG5cGwTNtGukl6h4h-NRX_iP06DaQ3uN1oYRCzIZ2ibZnGXn8z1yhyVtQRlTYSwd2CXcHUkSrXW9kTFuKFFYaHeEsaDhgavTZ2qZ38tm3HarUGnEz8YbpdrV9_9UWCliC-9QxitZ1bSSt7sVa5s_fnLtPG_Uz-C5lbJx142MeoYapidwME3E8IGdJ8zpgzBkYZWrC22rKraMZklbLHVFjBqsGHcZcbh-J1-kiwraeTLJkx63bjTt6riCtYrIYbckhwp2IcBhSc_8Qi2uZga1SoXSDHfkTL0PCfyKTsjTMIVOpgEqeDU3XY1cu2dQj2bZ3gGTGqVCBGqEKPQj-gtpbgOUydNeaIIjp1DwyzIbFH6Z8yqtbj4u_sW9vrxaDgbDsZPl7BvNqgkz11BPf9Y4TWBgFzdFHv_BdkqqpE |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+22nd+International+Conference+on+Computer+Theory+and+Applications+%28ICCTA%29&rft.atitle=On+balance+between+security+and+performance+for+LTE+wireless+networks&rft.au=Youssef%2C+K.+Y.&rft.au=Kamel%2C+H.&rft.au=Hafez%2C+A.+A.&rft.au=Zekry%2C+A.+H.+A.&rft.date=2012-10-01&rft.pub=IEEE&rft.isbn=9781467328234&rft.spage=60&rft.epage=65&rft_id=info:doi/10.1109%2FICCTA.2012.6523548&rft.externalDocID=6523548 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467328234/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467328234/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467328234/sc.gif&client=summon&freeimage=true |