This paper proposes an Authentication Interworking Protocol (AIP) based on IEEE 802.21 Medi Independent Handover (MIH) in the heterogeneous networks. The proposed AIP with the RSA-based proxy signature reduces han...This paper proposes an Authentication Interworking Protocol (AIP) based on IEEE 802.21 Medi Independent Handover (MIH) in the heterogeneous networks. The proposed AIP with the RSA-based proxy signature reduces handover delay time and communication message overhead when the mobile node moves between the heterogeneous networks. It defines new AlP Type Length Value (AlP TLV) in MIH frame format and uses the MIH Information Server (MIHIS) for issuing signature. The MIHIS can generate a signature on behalf of the AAA server and then the signature can he used by mobile node for a pre-authentication. For low handover delay, the proposed AIP performs pre-authentication processes with MIP protocol before layer 2 handover. Also, this paper analyses the performance of the handover and compares with the non-secure MIH.展开更多
This paper investigates the device-to-device(D2D) communication underlaying cellular network assisted by a two-way decode-and-forward relay node. We assume the base station(BS) is equipped with M-antenna and serves it...This paper investigates the device-to-device(D2D) communication underlaying cellular network assisted by a two-way decode-and-forward relay node. We assume the base station(BS) is equipped with M-antenna and serves its own cellular user while the D2D users communicate via a two-way decode-and-forward relay node. Both beamforming(BF) and interference cancellation(IC) strategies at the BS are considered to improve the performance for the cellular link and D2D link, respectively. We first analyze the received signal-to-interference-plus-noise for the cellular link under BF and IC strategies and then derive the exact closed-form expressions for the cellular link. Asymmetric and symmetric cases are discussed for various locations of each user. Finally, the approximations for high signal-to-noise regime are also presented. Numerical results demonstrate the accuracy of the analytical and asymptotic results.展开更多
基金supported by the Korea Science and Engineering Foundation(KOSEF)grant funded by the Korea government(MEST)(No.2010-0000100)the Ubiquitous Computing and Network(UCN)project,knowledge and economy frontier R&D program of the Ministry of Knowledge Economy(MKE)in Korea and a result of subproject10C2-C1-20S
文摘This paper proposes an Authentication Interworking Protocol (AIP) based on IEEE 802.21 Medi Independent Handover (MIH) in the heterogeneous networks. The proposed AIP with the RSA-based proxy signature reduces handover delay time and communication message overhead when the mobile node moves between the heterogeneous networks. It defines new AlP Type Length Value (AlP TLV) in MIH frame format and uses the MIH Information Server (MIHIS) for issuing signature. The MIHIS can generate a signature on behalf of the AAA server and then the signature can he used by mobile node for a pre-authentication. For low handover delay, the proposed AIP performs pre-authentication processes with MIP protocol before layer 2 handover. Also, this paper analyses the performance of the handover and compares with the non-secure MIH.
基金supported by the National Science Foundation for Distinguished Young Scholars of China(No.61701201)the Natural Science Foundation of Jiangsu Province(No.BK20170758,BK20170757)+1 种基金the Natural Science Foundation for colleges and universities of Jiangsu Province(No.17KJB510011)Project of Key Laboratory of Wireless Communications of Jiangsu Province
文摘This paper investigates the device-to-device(D2D) communication underlaying cellular network assisted by a two-way decode-and-forward relay node. We assume the base station(BS) is equipped with M-antenna and serves its own cellular user while the D2D users communicate via a two-way decode-and-forward relay node. Both beamforming(BF) and interference cancellation(IC) strategies at the BS are considered to improve the performance for the cellular link and D2D link, respectively. We first analyze the received signal-to-interference-plus-noise for the cellular link under BF and IC strategies and then derive the exact closed-form expressions for the cellular link. Asymmetric and symmetric cases are discussed for various locations of each user. Finally, the approximations for high signal-to-noise regime are also presented. Numerical results demonstrate the accuracy of the analytical and asymptotic results.