Several assessing efforts are approved making both communication and information technologies available.In addition to being a part of universal access and service,we aim at assessing the impact of radio access techno...Several assessing efforts are approved making both communication and information technologies available.In addition to being a part of universal access and service,we aim at assessing the impact of radio access technologies on universal access indicators.The proposed work demonstrates the possibility of inter-working of all existing Radio Access Technologies(RATs),in a limited area presented in the Six Generation Radio Resources Allocation(6 G-A)network.We propose a solution for the Vertical hand Over(VHO)in 6 G-A heterogeneous system,that adopts Media Independent Handover(MIH)protocol to benefit between different used technologies in a direct communication firstly and facilitate,in addition,coordination between congestion controlmechanisms with themobilitymanagement entity.The mathematical model has been developed to deal with locality coverage and broadband needs,based on a methodological approach consisting in integrating parameters linked to access index through radio technologies.This approach has been applied.In practice,it has contributed to highlighting its relative simplicity of implementation,but it is not enough for sixgeneration system radio access networks.The congestion control mechanism is integrated within the vertical handover process,this proposition is used to prevent each presented congestion state.The media independent handover IS equipment,as well as six G-A equipment which are both considered as the whole architecture key equipment,perform and guaranty this related process.Efficient communication is established besides information exchange between various technologies.Achieved evaluation results are performant and prove that proposed mechanisms are efficient.Both simulation and tests results are accomplished.展开更多
In the paper,we propose a fuzzy logic controller system to be implemented for smart mobility management in the 5G wireless communication network.Mobility management is considered as a main issue for all-IP mobile netw...In the paper,we propose a fuzzy logic controller system to be implemented for smart mobility management in the 5G wireless communication network.Mobility management is considered as a main issue for all-IP mobile networks future generation.As a network-based mobility management protocol,Internet Engineering Task Force developed the Proxy Mobile IPv6(PMIPv6)in order to support the mobility of IP devices,and many other results were presented to reduce latency handover and the amount of PMIPv6 signaling,but it is not enough for the application needs in realtime.The present paper describes an approach based on the IEEE 802.21 Media Independent Handover(MIH)standard and PMIPv6,so we present a new vertical handover algorithm for anticipating handover process efficiently.Our object is to propose a smart mobility management that contribute in 5G wireless communication system network operating functions.Two proposed dynamic thresholds were successfully made to guaranty process triggering,and a new primitive MIH is proposed for signaling a needed handover to be done.Simulation results demonstrate a significant reduction of the handover delay,packet loss,handover blocking probability and signaling overhead.Simulation results and tests are accomplished.展开更多
A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access. In addition, a specific protocol dist...A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access. In addition, a specific protocol distributing a hierarchi- cal key after the proactive authentication from key holder to base station has been proposed. The proposed hybrid authenti- cation framework not only performs proaetive authentication with credentials based on Chameleon hashing, which removes the authentication procedures that exchanges messages with a authentication server, but also performs re-authentication with EAP re-authentication protocol(ERP) that distributes the hierarchical key on the basis of the root key generated by the pro- active authentication.展开更多
文摘Several assessing efforts are approved making both communication and information technologies available.In addition to being a part of universal access and service,we aim at assessing the impact of radio access technologies on universal access indicators.The proposed work demonstrates the possibility of inter-working of all existing Radio Access Technologies(RATs),in a limited area presented in the Six Generation Radio Resources Allocation(6 G-A)network.We propose a solution for the Vertical hand Over(VHO)in 6 G-A heterogeneous system,that adopts Media Independent Handover(MIH)protocol to benefit between different used technologies in a direct communication firstly and facilitate,in addition,coordination between congestion controlmechanisms with themobilitymanagement entity.The mathematical model has been developed to deal with locality coverage and broadband needs,based on a methodological approach consisting in integrating parameters linked to access index through radio technologies.This approach has been applied.In practice,it has contributed to highlighting its relative simplicity of implementation,but it is not enough for sixgeneration system radio access networks.The congestion control mechanism is integrated within the vertical handover process,this proposition is used to prevent each presented congestion state.The media independent handover IS equipment,as well as six G-A equipment which are both considered as the whole architecture key equipment,perform and guaranty this related process.Efficient communication is established besides information exchange between various technologies.Achieved evaluation results are performant and prove that proposed mechanisms are efficient.Both simulation and tests results are accomplished.
文摘In the paper,we propose a fuzzy logic controller system to be implemented for smart mobility management in the 5G wireless communication network.Mobility management is considered as a main issue for all-IP mobile networks future generation.As a network-based mobility management protocol,Internet Engineering Task Force developed the Proxy Mobile IPv6(PMIPv6)in order to support the mobility of IP devices,and many other results were presented to reduce latency handover and the amount of PMIPv6 signaling,but it is not enough for the application needs in realtime.The present paper describes an approach based on the IEEE 802.21 Media Independent Handover(MIH)standard and PMIPv6,so we present a new vertical handover algorithm for anticipating handover process efficiently.Our object is to propose a smart mobility management that contribute in 5G wireless communication system network operating functions.Two proposed dynamic thresholds were successfully made to guaranty process triggering,and a new primitive MIH is proposed for signaling a needed handover to be done.Simulation results demonstrate a significant reduction of the handover delay,packet loss,handover blocking probability and signaling overhead.Simulation results and tests are accomplished.
基金The KCC(Korea Communications Commission),Korea,under the R&D program supervised by the KCA(Korea Communi-cations Agency)(KCA-2012-08-911-05-001)
文摘A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access. In addition, a specific protocol distributing a hierarchi- cal key after the proactive authentication from key holder to base station has been proposed. The proposed hybrid authenti- cation framework not only performs proaetive authentication with credentials based on Chameleon hashing, which removes the authentication procedures that exchanges messages with a authentication server, but also performs re-authentication with EAP re-authentication protocol(ERP) that distributes the hierarchical key on the basis of the root key generated by the pro- active authentication.