Optimized Security Context Switching with Low Latency in Vertical Handover
Optimized Security Context
Keywords:
Handoff, Target Network, Serving Network, Horizontal Handover, Security ContextAbstract
Handoff provides seamless mobility to users. When a user crosses the cell boundary of one base station (BS) and enters into the control area of another base station while a call is in progress, this process is called handoff. Horizontal Handoff (HHO) occur if the two base stations use the same network technology while vertical handover occur if the Serving Network (SN) and the Target Network (TN) uses different network technologies. One of the major technical challenges of vertical handover (VHO) is the transferring of security context. In heterogeneous networks the security mechanism of one network is different from other network. Therefore, when a mobile terminal (MT) executes vertical handover, security context with serving network is usually terminated and a new context with target network is created for the mobile terminal. If we securely transfer the old security context in VHO and reuse it with necessary adaptations, then overall latency in VHO will be reduced. In this way a full security context creation is avoided in VHO process and latency is reduced because home network is not involved in the handover process to transfer the security context. This paper presents an algorithm that provide optimized security context switching with low latency in vertical handover process.
References
N. Ekiz., T. Salih, S. Kucukoner and K. Fidanboylu. An overview of handoff techniques in cellular networks. International journal of information technology 2(3): 132-136 (2005).
X. Ma., Y. Cao, Y. Liu and K.S. Tarvidi, Modeling and performance analysis for soft handoff schemes in CDMA cellular systems. IEEE Transactions on Vehicular Technology 55(2): 670-680 (2006).
N. Nasser., A. Hasswa, and H. Hassanein. Handoffs in fourth generation heterogeneous networks. IEEE Communications Magazine 44(10): 96-103, (2006).
V.K. Garg, and T.S. Rappaport, Wireless network evolution: 2G to 3G, Prentice Hall PTR, (2001).
A.E. Leu, and B.L. Mark. Modeling and analysis of fast handoff algorithms for microcellular networks. Modeling, Analysis and Simulation of Computer and Telecommunications Systems, 2002. MASCOTS 2002. Proceedings. 10th IEEE International Symposium on, IEEE (2002)
N.D. Tripathi., J.H. Reed, and H.F. VanLandinoham. Handoff in cellular systems. IEEE personal communications 5(6): 26-37 (1998).
D. Wong, and T.J. Lim. Soft handoffs in CDMA mobile systems. IEEE Personal Communications 4(6): 6-17(1997).
X. Ma., Y. Liu and K.S. Trivedi. Design and performance analysis of a new soft handoff scheme for CDMA cellular systems. IEEE Transactions on Vehicular Technology 55(5): 1603-1612 (2006).
L.J. Chen., T. Sun, B. Chen, V. Rajendran, and M. Gerla, A smart decision model for vertical handoff. Proceedings of the 4th International Workshop on Wireless Internet and Re-configurability, Athens, Greece, (2004).
A. Mahmood., S. M. Hilles, and H. Zen. Vertical Handover Decision Schemes in Fourth Generation Heterogeneous Cellular Networks: A Comprehensive Study. International Journal of Business Data Communications and Networking (IJBDCN), 14(1) 1-26 (2018).
E. Stevens-Navarro., U. Pineda-Rico, and J. Acosta-Elis. Vertical handover in beyond third generation (B3G) wireless networks. International Journal of Future Generation Communication and Networking 1(1): 51-58 (2008).
T.S. Rappaport. Wireless communications: principles and practice, prentice hall PTR New Jersey (1996).
G.M.D.T. Forecast. Cisco visual networking index: global mobile data traffic forecast update, 2017–2022. Update, 2017: 2022 (2019)
P. Nikander, and L. Metso. Policy and trust in open multi-operator networks. Telecommunication Network Intelligence, Springer: 419-436, (2000).
I. Bisio., A. Sciarrone. Fast multiattribute network selection technique for vertical handover in heterogeneous emergency communication systems. Wireless Communications and Mobile Computing (2019).
S. Kalpana., S. Chandramathi. Authentication based on blind signature and ring signature algorithms during vertical handover in heterogeneous wireless networks. Cluster Computing. 22(5) 12037-12047 (2019).
H. Wang, and A.R. Prasad. Security context transfer in vertical handover. Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th IEEE Proceedings on IEEE (2003).
W. Stallings. Cryptography and Network Security 2nd edition, p 23-24, Prentice-Hall, Inc. ISBN 0-13-869017-0 (1999).
M. Salam., N. Rashid., S. Khalid, and M.R. Khan. A NXM Version of 5X5 Playfair Cipher for any Natural Language (Urdu as Special Case). World Academy of Science, Engineering and Technology. 73 (2011).