473 research outputs found
Fast Authentication in Heterogeneous Wireless Networks
The growing diffusion of wireless devices is leading to an increasing demand for mobility and security. At the same time, most applications can only tolerate short breaks in the data flow, so that it is a challenge to find out mobility and authentication methods able to cope with these constraints. This paper aims to propose an authentication scheme which significantly shortens the authentication latency and that can be deployed in a variety of wireless environments ranging from common Wireless LANs (WLANs) to satellite-based access networks
A Survey on Handover Management in Mobility Architectures
This work presents a comprehensive and structured taxonomy of available
techniques for managing the handover process in mobility architectures.
Representative works from the existing literature have been divided into
appropriate categories, based on their ability to support horizontal handovers,
vertical handovers and multihoming. We describe approaches designed to work on
the current Internet (i.e. IPv4-based networks), as well as those that have
been devised for the "future" Internet (e.g. IPv6-based networks and
extensions). Quantitative measures and qualitative indicators are also
presented and used to evaluate and compare the examined approaches. This
critical review provides some valuable guidelines and suggestions for designing
and developing mobility architectures, including some practical expedients
(e.g. those required in the current Internet environment), aimed to cope with
the presence of NAT/firewalls and to provide support to legacy systems and
several communication protocols working at the application layer
Attention to Wi-Fi Diversity: Resource Management in WLANs with Heterogeneous APs
Many home networks integrate a small number (typically 2-4) of Wi-Fi Access Points (APs), with heterogeneous characteristics: different 802.11 variants, capabilities and security schemes. This paper proposes the consideration of these specific characteristics in order to improve the management of network resources. Three use cases are presented in order to showcase the potential benefits. By the use of a user-space AP, which works in coordination with a controller, the network is able to assign each connected station to the AP that best fits with its characteristics. The system also manages security, avoiding the need of adding specific elements for authentication, encryption or decryption. Extensions are proposed to an existing protocol that defines the communication between the AP and the controller, in order to communicate and store the specific characteristics of each AP and end device. This includes new association and handoff schemes that do not introduce any additional delay. The system has been implemented in a real environment, and a battery of tests has been run using three hardware platforms of different characteristics. The results show that handoffs between bands are possible, and estimate the processing delays, the Round-Trip Time and the handoff delay, which is small enough in order not to produce any significant disruption to the user (10-50 ms). Finally, the scenarios of interest have been replicated in a simulation environment, showing that significant benefits can be achieved if the specific characteristics of each AP and station are considered
Queueing Networks for Vertical Handover
PhDIt is widely expected that next-generation wireless communication systems will be
heterogeneous, integrating a wide variety of wireless access networks. Of particular
interest recently is a mix of cellular networks (GSM/GPRS and WCDMA) and
wireless local area networks (WLANs) to provide complementary features in terms
of coverage, capacity and mobility support. If cellular/ WLAN interworking is to be
the basis for a heterogeneous network then the analysis of complex handover traffic
rates in the system (especially vertical handover) is one of the most essential issues to
be considered.
This thesis describes the application of queueing-network theory to the modelling of
this heterogeneous wireless overlay system. A network of queues (or queueing
network) is a powerful mathematical tool in the performance evaluation of many
large-scale engineering systems. It has been used in the modelling of hierarchically
structured cellular wireless networks with much success, including queueing
network modelling in the study of cellular/ WLAN interworking systems. In the
process of queueing network modelling, obtaining the network topology of a system
is usually the first step in the construction of a good model, but this topology
analysis has never before been used in the handover traffic study in heterogeneous
overlay wireless networks. In this thesis, a new topology scheme to facilitate the
analysis of handover traffic is proposed.
The structural similarity between hierarchical cellular structure and heterogeneous
wireless overlay networks is also compared. By replacing the microcells with
WLANs in a hierarchical structure, the interworking system is modelled as an open
network of Erlang loss systems and with the new topology, the performance
measures of blocking probabilities and dropping probabilities can be determined.
Both homogeneous and non-homogeneous traffic have been considered, circuit
switched and packet-switched. Example scenarios have been used to validate the
models, the numerical results showing clear agreement with the known validation
scenarios
Inter-Domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks
The convergence of diverse but complementary wireless access technologies and inter-operation among administrative domains have been envisioned as crucial for the next generation wireless networks that will provide support for end-user devices to seamlessly roam across domain boundaries. The integration of existing and emerging heterogeneous wireless networks to provide such seamless roaming requires the design of a handover scheme that provides uninterrupted service continuity while facilitating the establishment of authenticity of the entities involved. The existing protocols for supporting re-authentication of a mobile node during a handover across administrative domains typically involve several round trips to the home domain, and hence introduce long latencies. Furthermore, the existing methods for negotiating roaming agreements to establish inter-domain trust rely on a lengthy manual process, thus, impeding seamless roaming across multiple domains in a truly heterogeneous wireless network. In this thesis, we present a new proof-token based authentication protocol that supports quick re-authentication of a mobile node as it moves to a new foreign domain without involving communication with the home domain. The proposed proof-token based protocol can also support establishment of spontaneous roaming agreements between a pair of domains that do not already have a direct roaming agreement, thus allowing flexible business models to be supported. We describe details of the new authentication architecture, the proposed protocol, which is based on EAP-TLS and compare the proposed protocol with existing protocols
Fast and seamless mobility management in IPV6-based next-generation wireless networks
Introduction -- Access router tunnelling protocol (ARTP) -- Proposed integrated architecture for next generation wireless networks -- Proposed seamless handoff schemes in next generation wireless networks -- Proposed fast mac layer handoff scheme for MIPV6/WLANs
Mobile application able to analyse the Internet connections
The wide use of wireless networks in every aspect of our life has risen new challenges andsituations that affect the majority of the population around the globe. Issues such asinterferences between each network, fading or security attacks have to be bearded in mindwhen a wireless network is set up or when a user wants to establish connection with one.Therefore the goal of this study is the use and development of a mobile application that is ableto analyse the wireless networks that the device, a smartphone in this case. With theinformation obtained from the application the user should be able to find possible solution tothe challenges that may arise and to improve the quality of the service that he or she is usingin different environments with different characteristics. The testing of the application involvedthe obtainment of information in three different scenarios, the results of the three scenarioswere satisfactory. In all three scenarios the environment could be analysed successfully andsolutions could be given to improve the connectivity to each of the access points. <br /
Future Trends and Challenges for Mobile and Convergent Networks
Some traffic characteristics like real-time, location-based, and
community-inspired, as well as the exponential increase on the data traffic in
mobile networks, are challenging the academia and standardization communities
to manage these networks in completely novel and intelligent ways, otherwise,
current network infrastructures can not offer a connection service with an
acceptable quality for both emergent traffic demand and application requisites.
In this way, a very relevant research problem that needs to be addressed is how
a heterogeneous wireless access infrastructure should be controlled to offer a
network access with a proper level of quality for diverse flows ending at
multi-mode devices in mobile scenarios. The current chapter reviews recent
research and standardization work developed under the most used wireless access
technologies and mobile access proposals. It comprehensively outlines the
impact on the deployment of those technologies in future networking
environments, not only on the network performance but also in how the most
important requirements of several relevant players, such as, content providers,
network operators, and users/terminals can be addressed. Finally, the chapter
concludes referring the most notable aspects in how the environment of future
networks are expected to evolve like technology convergence, service
convergence, terminal convergence, market convergence, environmental awareness,
energy-efficiency, self-organized and intelligent infrastructure, as well as
the most important functional requisites to be addressed through that
infrastructure such as flow mobility, data offloading, load balancing and
vertical multihoming.Comment: In book 4G & Beyond: The Convergence of Networks, Devices and
Services, Nova Science Publishers, 201
- …