2015 International Conference on Communications, Management and Telecommunications (ComManTel) 2015
DOI: 10.1109/commantel.2015.7394254
|View full text |Cite
|
Sign up to set email alerts
|

Feasibility of SDN-based vertical handover between bluetooth and Wi-Fi

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Further study towards optimization was carried out by Liu et al [17] which basically performs selection of optimal network for minimizing computational load using software defined network. Such form of network and its feasibility was also investigated by Nyugen-Duc and Kamioka [18] considering real-time testbed of personal area network. Vuchkovska and Jakomosi [19] have addressed the problems of delay during vertical handover considering the case study of specific networking technologies e.g.…”
Section: A Related Workmentioning
confidence: 99%
“…Further study towards optimization was carried out by Liu et al [17] which basically performs selection of optimal network for minimizing computational load using software defined network. Such form of network and its feasibility was also investigated by Nyugen-Duc and Kamioka [18] considering real-time testbed of personal area network. Vuchkovska and Jakomosi [19] have addressed the problems of delay during vertical handover considering the case study of specific networking technologies e.g.…”
Section: A Related Workmentioning
confidence: 99%
“…However, this multi‐tier architecture also results in quite frequent handovers, which will pose great challenges for handover authentication between different APs especially for services with stringent latency requirements [2, 3]. Existing standardised handover authentication schemes are achieved in the upper layer with different authentication protocols and message flows involved for different handover scenarios [4], introducing high complexity and excessive latency which may be intolerable for some time‐sensitive services when applied to 5G HetNet [5]. Therefore, unified and fast handover authentication schemes applicable to different handover scenarios are urgently required.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, complex public cryptographic techniques are involved in most of these schemes, which cannot be well applied in resource‐constrained devices [3]. Some argue that the handover authentication could be implemented at lower layers, such as the data link layer or physical layer [5], without involving in different authentication protocols and layer‐to‐layer transfers.…”
Section: Introductionmentioning
confidence: 99%