Open Access   Article Go Back

A Survey on Secure Handover Optimization in Mobile WiMAX Network

B.M. Nikhar1 , K.N. Hande2

Section:Survey Paper, Product Type: Journal Paper
Volume-2 , Issue-2 , Page no. 21-27, Feb-2014

Online published on Feb 28, 2014

Copyright © B.M. Nikhar, K.N. Hande . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B.M. Nikhar, K.N. Hande, “A Survey on Secure Handover Optimization in Mobile WiMAX Network,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.21-27, 2014.

MLA Style Citation: B.M. Nikhar, K.N. Hande "A Survey on Secure Handover Optimization in Mobile WiMAX Network." International Journal of Computer Sciences and Engineering 2.2 (2014): 21-27.

APA Style Citation: B.M. Nikhar, K.N. Hande, (2014). A Survey on Secure Handover Optimization in Mobile WiMAX Network. International Journal of Computer Sciences and Engineering, 2(2), 21-27.

BibTex Style Citation:
@article{Nikhar_2014,
author = {B.M. Nikhar, K.N. Hande},
title = {A Survey on Secure Handover Optimization in Mobile WiMAX Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2014},
volume = {2},
Issue = {2},
month = {2},
year = {2014},
issn = {2347-2693},
pages = {21-27},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=46},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=46
TI - A Survey on Secure Handover Optimization in Mobile WiMAX Network
T2 - International Journal of Computer Sciences and Engineering
AU - B.M. Nikhar, K.N. Hande
PY - 2014
DA - 2014/02/28
PB - IJCSE, Indore, INDIA
SP - 21-27
IS - 2
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
4114 3687 downloads 3745 downloads
  
  
           

Abstract

GSM, UMTS, WIMAX, and WIFI are different wireless network types, which demands interoperability. Mobile WiMAX is the demanded technology for broadband wireless communication. The challenging aspect is to ensure service continuity for a mobile user when changing different access network. Due to the diversity of mobile networks and services offered by different operators, most users ask for better services without worrying about the technological constraints. Users must have the possibility to migrate from one area to another one without losing connection, knowing that these areas are using different technologies. Most of the Mobile users want quick and seamless service connection, and in mobile WiMAX network handover schemes, the authentication procedure takes long time to execute and thus producing delay in communication. This paper is the review of different handover mechanisms that has been proposed for reducing delay in communication between different users and providing fast and secure authentication schemes to meet the security requirement of users in the network. A pre-authentication based HO schemes for fast and secure HO, are shown to be vulnerable to Denial of Service attacks and Replay attacks. This paper discusses an EAP-based Authentication scheme, an EEP scheme and EAP-TTLS scheme which are proposed to optimize Handover Latency and to overcome above vulnerabilities with much less computational and communicational resources.

Key-Words / Index Term

EAP, IEEE 802.16e and Handover

References

[1]. T. N. Nguyen and M. Ma, �An Pre-authentication Protocol With Symmetric Key For Secure Handover in Mobile WiMAX Network�. IEEE ICC-communication and information system security Symposium-2012.
[2]. A. Fu, S. Lan, B. Huang, Z. Zhu and Y. Zhang, �A Novel Group-Based Handover Authentication Scheme With Privacy Preservation for Mobile WiMAX Networks�. IEEE Communication letter, vol. 16, no. 11, November 2012.
[3]. M. Shurman, M. F. Al-Mistarihi and S. Naseer, �Hard Handover Optimization in Mobile WiMAX Networks�, presented at the 5th International Conference on Communications, Computers and Application, Istanbul, Turkey, Oct. 2012.
[4]. Caiyong Hao, Hongali Liu, Jie Zhan, �A velocity-Adaptive handover scheme for mobile WiMAX�, International Journal of Communication, Network and System Sciences, vol. 2, no. 9.
[5]. E. Ahmed, B. Askwith and M. Merabti, �Handover Optimization for Real-Time Application in Mobile WiMAX/IEEE 802.16e� UK. ISBN: 978-1-902560-24-3, 2010 pp. 2-3.
[6]. A. Pontes, D. Silva, J. Jailton., K. Dias, �Handover Management in Integrated WLAN And Mobile WiMAX Networks� IEEE Wireless Communications, October 2008, pp. 88-90.
[7]. T. Nguyen and M. Ma, �Enhanced EAP-Based Pre-Authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks�, IEEE Transactions on Wireless Communications, Vol. 11, No. 6, pp. 2173-2175, June 2012.
[8]. A. Taha, A. Hamid and S. Tahar, �Formal Analysis of the Handover Schemes in Mobile WiMAX Networks� 2009 � IEEE.978-1-4244-3474, pp. 2-4.
[9]. Y. Benkaouz, B. Angoma and M. Erradi, �Performance Analysis of WiFi/WiMAX Vertical Handover based on Media Independent Handover� in Networking and Distributed Systems Research Group, 2012 � IEEE. 978-1-4673-1520.
[10]. T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2. New York: Springer, 2008.
[11]. J.Hur, H.Shim, P.Kim, H.Yoon and N-O.Song, �Security Considerations for Handover Schemes in Mobile WiMAX Networks,� Proc. of Int�l Conf. on Wireless Comm. And Networking, 2008.
[12]. S. More and D. K. Mishra, �4G Revolution: WiMAX Technology� in Department of Computer Science and Engineering, 2012 � IEEE. 978-1-473-2590.
[13]. Subhashini S., �Active EAP Protocol for Secure Inter ASN Handover in Mobile WiMAX Networks�, IJREAT International Journal of Research in Engineering & Advanced Technology, vol. 1, no. 2, April-May, 2013.
[14]. G. Zorn (2010, 09 December 2010). RADIUS Attributes for IEEE 802.16 Privacy Key Management Version 1(PKMv1) Protocol Support.[RFC 5904]. Available: http://www.rfc-editor.org/rfc/rfc5904.txt
[15]. Y. Ye, Q. Yi, and H. Sharif, �Performance analysis if IEEE 802.16e handover with RSA-based authentication�, in ICC 2010-2010 IEEE International Conference on Communications, 23-27 May 2010, Piscataway, NJ, USA, 2010, p.5 pp.
[16]. Lee D.H., Kyamekya K., Umondi J.P., �Fast Handover Algorithm for IEEE 802.16e Broadband Wireless Access System�, ISWPC 2006.
[17]. H-M.Sun, S-Y.Chang, Y-H.Lin and S-Y.Chiou, �Efficient Authentication Schemes for Handover in Mobile WiMAX,� Proc. of 8th Int�l Conf. on Syst. Design and Applications, 2008.