2019
DOI: 10.1016/j.jnca.2018.09.002
|View full text |Cite
|
Sign up to set email alerts
|

MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(20 citation statements)
references
References 26 publications
0
19
0
Order By: Relevance
“…Since our method is established on the MIH [35], it is comparatively fast and needs a lower time to get the necessary information about available networks. Also, in the designed architecture the number of UAVs are mapped in a single iteration.…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Since our method is established on the MIH [35], it is comparatively fast and needs a lower time to get the necessary information about available networks. Also, in the designed architecture the number of UAVs are mapped in a single iteration.…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…Recently, the support of mobile drones such as UAV-MNs and UAV-BSs has been explored in 3GPP standardization efforts [34]. Particularly, there has been an increasing interest in the community to characterize the effect of the mobility of drones on their performance, whether they are cellular connected UAVs or aerial BSs [35], [36]. Sharma et al [36] proposed SDN based handover mechanisms to achieve fast MN handover between different aerial cells.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To benefit from MIH IEEE 802.21 handover protocol, Vishal et al [ 43 ] proposed a security solution for MIH-based F-PMIPv6 cross-layer handover scheme [ 29 ]. This paper proposes an MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6 networks (MIH-SPFP) which can support handoffs in highly dynamic and heterogeneous IoT networks empowered by the mobile 5G technology.…”
Section: Related Workmentioning
confidence: 99%
“…The state-of-the-art comparison of existing approach for cloud-driven networks is presented in Table 1. Some other research works to follow are, cloud computing governance [39], securing the cloud-Governance[40, big data fraud detection [41], single sign-on for clouds [42], proactive user-centric security [43], preventing insider cyber threats [44], authentication and authorizations [45], email spam prevention in logistics [46], proxy network formations [47], firewall management [48][49]and big-traffic evaluations [50].…”
Section: Related Workmentioning
confidence: 99%