American Journal of Networks and Communications
Volume 9, Issue 1, June 2020, Pages: 1-10
Received: Dec. 30, 2019;
Accepted: Jan. 13, 2020;
Published: Apr. 1, 2020
Views 281 Downloads 57
Vincent Omollo Nyangaresi, School of Informatics & Innovative Systems, Jaramogi Oginga Odinga University of Science & Technology, Bondo, Kenya
Silvance Onyango Abeka, School of Informatics & Innovative Systems, Jaramogi Oginga Odinga University of Science & Technology, Bondo, Kenya
Anthony Joachim Rodrigues, School of Informatics & Innovative Systems, Jaramogi Oginga Odinga University of Science & Technology, Bondo, Kenya
Long delays during the handover process lead to dropped calls which deteriorate the network quality of service. In addition, these delays impede the incorporation of authentication during the handover process which exposes the handover process to attacks such as desynchronization, network masquerading and session hijacking. In this paper, a delay sensitive protocol is developed based on the neuro-fuzzy optimization process and tracking area partitioning into no handover region, low probability handover region and high probability handover region that facilitated advance buffering of the figures of merit. The protocol computes the average delays during the handover process such that handovers taking longer durations than the average value are queued in the mobility management entity (MME) buffer and dispatched in a first in first out (FIFO) basis. The conventional permitted duration between handover command and handover execution is between 0.5 seconds and 1.5 seconds. To prevent holding the network resources for long durations, a handover termination duration was set to the lower bound of this conventional permitted duration, which was 0.5 seconds, such that handovers taking longer this duration were explicitly dropped. The reduced delays during the handover process facilitated the incorporation of entities authentication before subscribers can be transferred to the target cell. Simulation results showed the developed protocol greatly reduced handover delays to an average of 0.048 seconds. In addition, the source evolved Node-B (eNB), user equipment (UE) and target eNB were able to authenticate each other to boost security during the handover process.
Vincent Omollo Nyangaresi,
Silvance Onyango Abeka,
Anthony Joachim Rodrigues,
Delay Sensitive Protocol for High Availability LTE Handovers, American Journal of Networks and Communications.
Vol. 9, No. 1,
2020, pp. 1-10.
Basaras P., Belikaidis I., Maglaras L., and Katsaros D. (2016). Blocking epidemic propagation in vehicular networks, in Wireless On-demand Network Systems and Services (WONS), 12th Annual Conference on. IEEE, pp. 1–8.
Babiker A., H. Ahmmed H., & Ali S.(2016). Comparative Study 1st, 2nd, 3rd, 4th, Generations from Handoff Aspects. International Journal of Science and Research, Vol. 5, Issue 6, pp. 934-941.
Kastell K., Meyer U.,& R. Jakoby R. (2013). Secure Handover Procedures. Department of Computer Science, Darmstadt University of Technology, pp. 1-5.
Osahenvemwen O., & F. Odiase F. (2016). Effective management of handover process in mobile communication network. Journal of Advances in Technology and Engineering Studies, Vol. 2, Issue 6, pp. 176-182.
Zhang L., and Pierre S. (2014). An enhanced fast handover with seamless mobility support for next-generation wireless networks, Journal of Network and Comput. Applications, Vol. 46, pp. 322 – 335.
Sridevi B., and Mohan D. (2015). Security analysis of Handover Key Management among 4G LTE entities Using Device Certification, International Journal of Electrical, Computing Engineering and Communication, Vol. 1, No 2, pp. 1-7.
Lin Y., Longjhuang W., & Chen Yang C. (2015). Enhanced 4G LTE Authentication and Handover Mechanism. International Journal of Electrical, Electronics and Data Communication, Vol. 3, Issue 9, pp. 45-47.
Han C., and Choi H.(2014). Security analysis of handover key management in 4G LTE/SAE networks, IEEE Trans. Mobile Comput., Vol. 13, No. 2, pp. 457- 468.
Tayade P., and Vijaykumar P. (2017). A Comprehensive Contemplate on Security Aspects of LTE and LTE Advanced in Wireless Communication Network, International Journal of Control Theory and Applications, Vol. 10, No 31, pp. 197-217.
Agarwal P., Thomas D., and Kumar A. (2017). Security Analysis of LTE/SAE Networks under De-synchronization Attack for Hyper-Erlang Distributed Residence Time, IEEE Communications Letters, Vol 21, No 5, pp. 1055-1058.
Cao J., Ma M., Li H., Zhang Y., and Luo Z. (2014). A survey on security aspects for LTE and LTE-A networks, IEEE Commun. Surveys TUTs., Vol. 16, no. 1, pp. 283–302.
Lai Y., Cheng P., Lee C., & CKu C. (2016). A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network. Department of Photonics and Communication Engineering, Asia University, Taichung, Taiwan, pp. 1-18.
Copet P., Marchetto G., Sisto R., & Costa L. (2015). Formal Verification of LTE-UMTS Handover Procedures. IEEE, pp. 1-8.
Degefa F., Lee D., Kim J., Choi Y., and Won D. (2016). Performance and security enhanced authentication and key agreement protocol for SAE/LTE network, Computer Networks, Vol 94, pp. 145-163.
Nashwan S., and Alshammari B. (2017). Formal Analysis of MCAP protocol Against replay Attack, British Journal of Mathematics & Computer Science, Vol 22, No 1, pp. 1-14.