2009 Third International Conference on Network and System Security 2009
DOI: 10.1109/nss.2009.14
|View full text |Cite
|
Sign up to set email alerts
|

Securing Roaming and Vertical Handover in Fourth Generation Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 4 publications
0
12
0
Order By: Relevance
“…HOKEY solution for seam less handover is based on establishing key hierarchies and using it for secure context transfer, however this solution is very cumbersome and not light weight. In [7], author proposed a global authentication protocol in 4G networks. This protocol enables a vertical handover without requiring a prior subscription to the visited network.…”
Section: Surveymentioning
confidence: 99%
“…HOKEY solution for seam less handover is based on establishing key hierarchies and using it for secure context transfer, however this solution is very cumbersome and not light weight. In [7], author proposed a global authentication protocol in 4G networks. This protocol enables a vertical handover without requiring a prior subscription to the visited network.…”
Section: Surveymentioning
confidence: 99%
“…If the predictive approach is replaced with reactive or proactive handoff it will better tackle the latency issue [6]. The authors Neila KRICHENE et al [7] recommended an authentication scheme for vertical handoff among four distinct networks GSM, UMTS, WiFi and WiMAX knocking out any earlier subscription of mobile node for inter or intra networks. The author's proved the resistance of the authentication scheme for denial of service attacks and MIM attack.…”
Section: Literature Review /Related Workmentioning
confidence: 99%
“…The author's proved the resistance of the authentication scheme for denial of service attacks and MIM attack. But this work is only limited for mesh topology in 4G networks and doesn't take care for quality of service during vertical handoff [7]. The paper [8] described a vertical handoff among WiFi, WiMAX and UMTS networks.…”
Section: Literature Review /Related Workmentioning
confidence: 99%
“…In case of loose coupling between WiMAX and WiFi networks operators have to describe supplementary mechanisms to implement network intelligence be capable to execute vertical handovers, as WiFi networks are incapable of management. In case of tight coupling, WiMax apparatus will be utilized to tackle subscribers' mobility and seamless connection shift, as they are capable of intelligent management [5].…”
Section: Introductionmentioning
confidence: 99%
“…In this paper the author's Neila KRICHENE et al discussed a vertical authentication method among the GSM, UMTS, WiFi and WiMAX technologies, regardless of any previous subscription to the visited network [5]. Strength of the paper is that, the authors proposed a global authentication protocol authorizing vertical handover between 4G architecture networks and proved the strength of the protocol against manin-the-middle and denial of service attacks during vertical handover.…”
Section: Introductionmentioning
confidence: 99%