Secured Cost Effective Group Handover Authentication Scheme For WiMAX Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Technological improvement of Wireless Communication is important aspect of our daily life. Mobile WiMAX IEEE 802.16m standard aims at fulfilling the requirements on 4G Systems. Providing seamless handover authentication is a critical issue in this area. This paper proposes a grouping of mobile stations algorithm to reduce the handover latency including security considerations. In our scheme the MSs which have similar Signal to Interference-plus-Noise Ratio(SINR) are grouped into the same handover group. In that MS group, while the first MS of the same handover group leaves from the service base station (SBS) to target BS (tBS), the SBS transmits all the details of the handover group members security context to the tBS. Hence the rest of the MS in that group avoids the Extensible Authentication Protocol (EAP) and Security Context Transfer phases and directly performs the handover authentication which reduces the handover latency
Authors and Affiliations
Mohanaprasanth. P, , B. Sridevi, , Dr. S. Rajaram
Normalization of Intuitionistic Fuzzy Rough Relational Databases
In this paper, a method of normalization of a relational schema with intuitionistic fuzzy rough attributes in first normal form is presented. The method is implemented by an example which shows that how the proce...
A New Way to Implement Stegnography by Minimizing Distortion
In this paper we are going to learn about the minimization of distortion in steganography. For this purpose we use a general nonbinary embedding operation and discuss various system requirements. We assume every possible...
RC Band Pass Filters Analysis for Under damped Operating Conditions
Filters of some sort are essential to the operation of most electronic circuits. It is therefore in the interest of anyone involved in electronic circuit design to have the ability to develop filter circuits capable o...
A Secured Data Transmission using Genetic based Encryption Techniques over Wireless Networks
The speedy development in wireless networks entails the defending data while transmitting in the network. To employ cryptographic algorithm is difficult view in wireless networks. Biometric features such as face, v...
A Comparative Analysis in Terms of Message Passing & Complexity of Different Coordinator Selection Algorithms in Distributed System
In distributed systems, many of the algorithms that have been used are typically not completely symmetrical, and some node has to take the lead in initiating the algorithm. The main role of an elected coordinator i...