search query: @supervisor Karila, Arto / total: 76
reference: 67 / 76
« previous | next »
Author:Iartym, Igor
Title:Security of the IP Packet Data Service in Wireless Networks
Langattoman IP-pakettidatapalvelun tietoturvakysymyksiä
Publication type:Master's thesis
Publication year:1997
Pages:xiv + 88      Language:   eng
Department/School:Tietotekniikan osasto
Main subject:Tietokoneverkot   (Tik-110)
Supervisor:Karila, Arto
Instructor:Nieminen, Seppo
OEVS:
Electronic archive copy is available via Aalto Thesis Database.
Instructions

Reading digital theses in the closed network of the Aalto University Harald Herlin Learning Centre

In the closed network of Learning Centre you can read digital and digitized theses not available in the open network.

The Learning Centre contact details and opening hours: https://learningcentre.aalto.fi/en/harald-herlin-learning-centre/

You can read theses on the Learning Centre customer computers, which are available on all floors.

Logging on to the customer computers

  • Aalto University staff members log on to the customer computer using the Aalto username and password.
  • Other customers log on using a shared username and password.

Opening a thesis

  • On the desktop of the customer computers, you will find an icon titled:

    Aalto Thesis Database

  • Click on the icon to search for and open the thesis you are looking for from Aaltodoc database. You can find the thesis file by clicking the link on the OEV or OEVS field.

Reading the thesis

  • You can either print the thesis or read it on the customer computer screen.
  • You cannot save the thesis file on a flash drive or email it.
  • You cannot copy text or images from the file.
  • You cannot edit the file.

Printing the thesis

  • You can print the thesis for your personal study or research use.
  • Aalto University students and staff members may print black-and-white prints on the PrintingPoint devices when using the computer with personal Aalto username and password. Color printing is possible using the printer u90203-psc3, which is located near the customer service. Color printing is subject to a charge to Aalto University students and staff members.
  • Other customers can use the printer u90203-psc3. All printing is subject to a charge to non-University members.
Location:P1 Ark T80     | Archive
Keywords:security
TCP/IP
TETRA
transaction
Windows NT
Abstract (eng):The TCP/IP protocols provide data packet services on the Internet.
These protocols are associated with the most popular networking applications.
Today there exists an opportunity to utilize the TCP/IP protocols in wireless networks.
Mobility on one hand and possibility of an access to remote sources of information on the other hand give a chance for particular groups of users to benefit from the TCP/IP network level services.
Business, transportation, public safety and security are examples of application areas that can utilize the TCP/IP protocols.

The TCP protocol is a part of the TCP/IP protocol stack.
This protocol was developed to provide a reliable transport service over unreliable networks.
Unfortunately TCP was designed without taking into consideration the problems associated with future narrowband cellular netwoks.
Nevertheless the TCP protocol can be utilized in wireless networks as such, but certain modifications of TCP allow to meet the low bandwidth requirement more optimally.
One of the modified TCP protocols is called the Transaction TCP (T/TCP) protocol.
At minimum, it sends only three segments to perform a reliable transaction as compare with at least nine segments of standard TCP.

The main problem associated with TCP/IP is concerning its security.
As TCP/IP security had been identified as a problem on the Internet, a number of protocols was developed to compensate the security shortcoming of existing TCP/IP.
These protocols are usually inserted in the TCP/IP stack between the application and the transport layers.
They use TCP/IP to negotiate security parameters on behalf of other applications, and thus introduce an additional traffic prior to a normal data exchange.
In contrast to these approaches, this work proposes a concept of Transaction TCP protocol with integrated security functions and suggests further extensions of this protocol.

The new secure Transaction TCP protocol avoids a negotiation of compression and encryption algorithms by employing standard methods.
This protocol is not intended for interoperability with conventional TCP, but its implementation can support TCP by switching the security functions off manually or otherwise.
ED:1998-01-08
INSSI record number: 12781
+ add basket
« previous | next »
INSSI