Seamless and secure handover scheme in mobile WiMAX
Handover performance plays an essential role in ensuring that an excellent result is realized for most of the real-time applications in WiMAX networks. Generally, the entire interruption found in the handover process exists in three categories: i) link layer handover delay, ii) IP network layer hand...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/67709/1/FK%202015%20124%20IR.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-upm-ir.67709 |
---|---|
record_format |
uketd_dc |
spelling |
my-upm-ir.677092019-03-26T08:08:12Z Seamless and secure handover scheme in mobile WiMAX 2015-12 Rashid, Hamzah Fareed Handover performance plays an essential role in ensuring that an excellent result is realized for most of the real-time applications in WiMAX networks. Generally, the entire interruption found in the handover process exists in three categories: i) link layer handover delay, ii) IP network layer handover delay, iii) security sub-layer handover delay. According to research the large portion of the delay associated with the handover process originates from user authentication and network entry and re-entry. Some types of soft real-time applications which include media streaming, however, require the smallest interruption for effective service. Unfortunately the existing design of the handover scheme lacks the ability to provide a seamless and secure connection [8][9]. Therefore, making use of this conventional technique will be unsuitable [22]. This thesis introduces an efficient design that can provide a seamless and secure communication especially over the subsequent handover; we named it (Seamless & Secure Subsequent Handover) 3SHO for short. This approach considers the use of a pre-authentication method and prior backhaul inter-communication, to generate a minimum delay that is suitable for some types of soft real-time application. Results obtained from analytical comparison and simulation; indicate that 3SHO approach achieves 72% improvement when compared to the standard [8][9], and 38% improvement over the enhanced scheme in [40]. When it comes to packet loss, the simulation results show that 3SHO approach achieves 76% improvement over the standard [8][9], and 56% improvement over the enhanced scheme in [40]. Parallel to the seamless handover, the proposed pre-authentication scheme proves to be a fine addition to our approach towards achieving a seamless handover with backward/forward secrecy characteristic. Furthermore,3SHO approach is verified using Automated Validation of Internet Security Protocols and Applications (AVISPA). Mobile communication systems Network performance (Telecommunication) Wireless communication systems 2015-12 Thesis http://psasir.upm.edu.my/id/eprint/67709/ http://psasir.upm.edu.my/id/eprint/67709/1/FK%202015%20124%20IR.pdf text en public masters Universiti Putra Malaysia Mobile communication systems Network performance (Telecommunication) Wireless communication systems |
institution |
Universiti Putra Malaysia |
collection |
PSAS Institutional Repository |
language |
English |
topic |
Mobile communication systems Network performance (Telecommunication) Wireless communication systems |
spellingShingle |
Mobile communication systems Network performance (Telecommunication) Wireless communication systems Rashid, Hamzah Fareed Seamless and secure handover scheme in mobile WiMAX |
description |
Handover performance plays an essential role in ensuring that an excellent result is realized for most of the real-time applications in WiMAX networks. Generally, the entire interruption found in the handover process exists in three categories: i) link layer handover delay, ii) IP network layer handover delay, iii) security sub-layer handover delay.
According to research the large portion of the delay associated with the handover process originates from user authentication and network entry and re-entry. Some types of soft real-time applications which include media streaming, however, require the smallest interruption for effective service.
Unfortunately the existing design of the handover scheme lacks the ability to provide a seamless and secure connection [8][9]. Therefore, making use of this conventional technique will be unsuitable [22]. This thesis introduces an efficient design that can provide a seamless and secure communication especially over the subsequent handover; we named it (Seamless & Secure Subsequent Handover) 3SHO for short.
This approach considers the use of a pre-authentication method and prior backhaul inter-communication, to generate a minimum delay that is suitable for some types of soft real-time application. Results obtained from analytical comparison and simulation; indicate that 3SHO approach achieves 72% improvement when compared to the standard [8][9], and 38% improvement over the enhanced scheme in [40].
When it comes to packet loss, the simulation results show that 3SHO approach achieves 76% improvement over the standard [8][9], and 56% improvement over the enhanced scheme in [40]. Parallel to the seamless handover, the proposed pre-authentication scheme proves to be a fine addition to our approach towards achieving a seamless handover with backward/forward secrecy characteristic. Furthermore,3SHO approach is verified using Automated Validation of Internet Security Protocols and Applications (AVISPA). |
format |
Thesis |
qualification_level |
Master's degree |
author |
Rashid, Hamzah Fareed |
author_facet |
Rashid, Hamzah Fareed |
author_sort |
Rashid, Hamzah Fareed |
title |
Seamless and secure handover scheme in mobile WiMAX |
title_short |
Seamless and secure handover scheme in mobile WiMAX |
title_full |
Seamless and secure handover scheme in mobile WiMAX |
title_fullStr |
Seamless and secure handover scheme in mobile WiMAX |
title_full_unstemmed |
Seamless and secure handover scheme in mobile WiMAX |
title_sort |
seamless and secure handover scheme in mobile wimax |
granting_institution |
Universiti Putra Malaysia |
publishDate |
2015 |
url |
http://psasir.upm.edu.my/id/eprint/67709/1/FK%202015%20124%20IR.pdf |
_version_ |
1747812506017988608 |