14 research outputs found

    Network Selection Problems - QoE vs QoS Who is the Winner?

    Get PDF
    In network selection problem (NSP), there are now two schools of thought. There are those who think using QoE (Quality of Experience) is the best yardstick to measure the suitability of a Candidate Network (CN) to handover to. On the other hand, Quality of Service (QoS) is also advocated as the solution for network selection problems. In this article, a comprehensive framework that supports effective and efficient network selection is presented. The framework   attempts to provide a holistic solution to network selection problem that is achieved by combining both of the QoS and QoE measures.   Using this hybrid solution the best qualities in both methods are combined to overcome issues of the network selection problem According to ITU-R (International Telecommunications Union – Radio Standardization Sector), a 4G network is defined as having peak data rates of 100Mb/s for mobile nodes with speed up to 250 km/hr and 1Gb/s for mobile nodes moving at pedestrian speed. Based on this definition, it is safe to say that mobile nodes that can go from pedestrian speed to speed of up to 250 km/hr will be the norm in future. This indicates that the MN’s mobility will be highly dynamic. In particular, this article addresses the issue of network selection for high speed Mobile Nodes (MN) in 4G networks. The framework presented in this article also discusses how the QoS value collected from CNs can be fine-tuned to better reflect an MN’s current mobility scenario

    Enhancement of FMIPv6 by Utilising Concurent Binding Update Process

    Get PDF
    The world is progressing toward the Mobile Internet Protocol Television (MIPTV) era where people are able to watch television while roaming. The MIPTV technology requires high bandwidth and low latency handover. This paper enhances the binding updates process in the Fast Handover Mobile IPv6 (FMIPv6) to improve its handover process performance in term of secureness and robustness, by implementing concurant binding update process thru the use of the International Mobile Subscriber Identifier (IMSI). Simulation results show that the proposed idea reduces the handover latency to about 63% compared to standard FMIPv6

    Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard

    Get PDF
    In this paper we scrutinize the security properties of an RFID authentication protocol conforming to the EPC Class-1 Generation-2 standard. The protocol is suitable for Gen-2 passive tags and requires simple computations. The authors claim that the scheme provides privacy protection and authentication and offers resistant against commonly assumed attacks. We propose a de-synchronization and an impersonation attack in which the disclosing of the secret information (i.e. secret key and static identifier) shared between the tag and the reader is unnecessary to success in these attacks

    SLRV: An RFID Mutual Authentication Protocol Conforming to EPC Generation-2 Standard

    Get PDF
    Having done an analysis on the security vulnerabilities of Radio Frequency Identification (RFID) through a desynchronization and an impersonation attacks, it is revealed that the secret information (i.e.: secret key and static identifier) shared between the tag and the reader is unnecessary. To overcome the vulnerability, this paper introduces Shelled Lightweight Random Value (SLRV) protocol; a mutual authentication protocol with high-security potentials conforming to  electronic product code (EPC) Class-1 Generation-2 Tags, based on lightweight and standard cryptography on the tag’s and reader’s side, respectively. SLRV prunes de-synchronization attacks where the updating of internal values is only executed on the tag’s side and is a condition to a successful mutual authentication. Results of security analysis of SLRV, and comparison with existing protocols, are presented

    SeamSAR: Seamless, Secure And Robust Handover Model for Mobile IPTV Network Using Enhanced FMIPv6

    Get PDF
    Multimedia becomes one of the most wanted content in the modern Internet world. Since the Mobile Internet Protocol version 6 (MIPv6) was proposed, many researchers have tried to develop a new protocol based on this technology in order to improve the performance of mobile multimedia services. The world is emerging toward the Mobile Internet Protocol Television (MIPTV) era where people are enabled to watch television while roaming. The MIPTV technology requires high bandwidth and low latency handover. This paper proposes a new model of secure and robust handover with low handover latency, called SeamSAR. The model introduces a new way to perform home binding update and correspondent binding update simultaneously. Simulation results show that the proposed model reduced the handover latency to 63% compared to FMIPv6. Moreover, the secureness of the proposed model was verified using CMurphi simulator

    Enhancement of FMIPv6 by Utilising Concurent Binding Update Process

    Full text link
    The world is progressing toward the Mobile Internet Protocol Television (MIPTV) era where people are able to watch television while roaming. The MIPTV technology requires high bandwidth and low latency handover. This paper enhances the binding updates process in the Fast Handover Mobile IPv6 (FMIPv6) to improve its handover process performance in term of secureness and robustness, by implementing concurant binding update process thru the use of the International Mobile Subscriber Identifier (IMSI). Simulation results show that the proposed idea reduces the handover latency to about 63% compared to standard FMIPv6

    Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard

    Full text link
    In this paper we scrutinize the security properties of an RFID authentication protocol conforming to the EPC Class-1 Generation-2 standard. The protocol is suitable for Gen-2 passive tags and requires simple computations. The authors claim that the scheme provides privacy protection and authentication and offers resistant against commonly assumed attacks. We propose a de-synchronization and an impersonation attack in which the disclosing of the secret information (i.e. secret key and static identifier) shared between the tag and the reader is unnecessary to success in these attacks

    LTE and WiMAX: Comparison and Future Perspective

    No full text
    corecore