scholarly journals Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication

2007 ◽  
Vol 24 (05) ◽  
pp. 667-685 ◽  
Author(s):  
JANG-HYUN BAEK ◽  
KYUNG-HEE KIM ◽  
DOUGLAS C. SICKER

An efficient mobility management for mobile stations plays an important role in mobile communication networks. Two basic operations of mobility management are location registration and paging. A zone-based registration (ZBR) is implemented in most of the mobile communication networks and we consider the mobility management scheme that combines a zone-based registration and a selective paging (SP). We propose a new analytical model that can reflect the characteristics of the ZBR smoothly where location areas of the ZBR are set up so that regions such as roads, bridges, rivers and mountains, where there is relatively little traffic, will constitute their boundaries. We adopt a revised 2-dimensional random walk mobility model to consider such characteristics. In addition, we propose a more efficient division scheme of location area for 2-step selective paging. We evaluate the performance of the mobility management scheme using our mobility model to determine the optimal size of a location area that will result in the minimum signaling traffic on radio channels. Numerical results are provided to demonstrate that our mobility model is useful to evaluate the ZBR more exactly. The results of this study can be used effectively in analyzing and comparing the performances of various mobility management schemes.


2013 ◽  
Vol 2013 ◽  
pp. 1-16 ◽  
Author(s):  
Abhishek Majumder ◽  
Sudipta Roy

Seamless mobility management of the mesh clients (MCs) in wireless mesh network (WMN) has drawn a lot of attention from the research community. A number of mobility management schemes such as mesh network with mobility management (MEMO), mesh mobility management (M3), and wireless mesh mobility management (WMM) have been proposed. The common problem with these schemes is that they impose uniform criteria on all the MCs for sending route update message irrespective of their distinct characteristics. This paper proposes a session-to-mobility ratio (SMR) based dynamic mobility management scheme for handling both internet and intranet traffic. To reduce the total communication cost, this scheme considers each MC’s session and mobility characteristics by dynamically determining optimal threshold SMR value for each MC. A numerical analysis of the proposed scheme has been carried out. Comparison with other schemes shows that the proposed scheme outperforms MEMO,M3, and WMM with respect to total cost.


2018 ◽  
Vol 232 ◽  
pp. 04078
Author(s):  
Min Zhang ◽  
Jun-Bin Liang

Mobile wireless sensor networks (MWSN) are composed of a large number of mobile sensor nodes, which are used to collect data. MWSN have been widely applied in a variety of harsh environments, so mobile sensor nodes are often at risk of damage. How to manage mobile sensor nodes is an important issue. In this paper, we analyse different mobility management schemes proposed in some typical research literature and classify these schemes by using three features: the collaboration between mobile sensor nodes, routing and deployment in MWSN. We specify advantages and disadvantages of the proposed schemes, compare different key parameters of MSWN respectively, including energy efficiency, data delay, cost and lifetime, etc. Finally, we discuss existing problems of MWSN management and give some helpful suggestions in this area.


2015 ◽  
Vol 7 (3) ◽  
pp. 1 ◽  
Author(s):  
Haider Noori AL-Hashimi ◽  
Waleed Noori Hussein

VANET Networks are one of the main next generation wireless networks which are envisaged to be an integration of homogeneous and heterogeneous wireless networks. The inter-networking of these wireless networks with the Internet will provide ubiquitous access to roaming network users. However, a seamless handover mechanism with negligible handover delay is required to maintain active connections during roaming across these networks. Several solutions, mainly involving host-based localized mobility management schemes, have been widely proposed to reduce handover delay among homogeneous and heterogeneous wireless networks. However, the handover delay remains high and unacceptable for delay-sensitive services such as real-time and multimedia services. Moreover, these services will be very common in next generation wireless networks. Unfortunately, these widely proposed host-based localized mobility management schemes involve the vehicle in mobility-related signalling hence effectively increasing the handover delay. Furthermore, these schemes do not properly address the advanced handover scenarios envisaged in future wireless networks. This paper, therefore, proposes a VANET mobility management framework utilizing cross-layer design, the IEEE 802.21 future standard, and the recently emerged network-based localized mobility management protocol, Proxy Mobile IPv6, to further reduce handover delay.


Author(s):  
László Bokor ◽  
Zoltán Faigl ◽  
Sándor Imre

This paper is committed to give an overview of the Host Identity Protocol (HIP), to introduce the basic ideas and the main paradigms behind it, and to make an exhaustive survey of mobility management schemes in the Host Identity Layer. The authors' goal is to show how HIP emerges from the list of potential alternatives with its wild range of possible usability, complex feature set and power to create a novel framework for future Mobile Internet architectures. In order to achieve this, the authors also perform an extensive simulation evaluation of four selected mobility solutions in the Host Identity Layer: the standard HIP mobility/multihoming (RFC5206), a micromobility solution (µHIP), a network mobility management scheme (HIP-NEMO) and a proactive, cross-layer optimized, distributed proposal designed for flat architectures (UFA-HIP).


2015 ◽  
Vol 73 (1) ◽  
Author(s):  
Adnan Shahid Khan ◽  
Halikul Lenando ◽  
Johari Abdullah ◽  
Norsheila Fisal

Mobile Multihop Relay (MMR) network is one of the emerging technologies, especially LTE-Advanced, WiMAX and the Smart grid communications. Ensuring security is one of the most imperative and challenging issues in MMR networks. Privacy Key Management (PKM) protocol is proposed to ensure the security measures in MMR networks. However, the protocol still faces several security threats, specifically Denial of Service (DoS), replay attacks, Man in the Middle (MitM) attacks and the interleaving attacks, which is termed as Medium Access Control (MAC) layer attacks. This paper proposed a modified version PKM protocol for both unilateral and mutual authentication, which is termed as Self-organized Efficient Authentication and Key Management Scheme (SEAKS) authentication protocol. This protocol ensures secure end-to-end data transmission using distributed hop-by-hop authentication and localized key management schemes with a very simple and efficient way.


Sign in / Sign up

Export Citation Format

Share Document