An enhanced Scheme for Reducing Vertical handover latency

Faisal, Mohammad; Khan, Muhammad Nawaz
January 2012
International Journal of Advanced Computer Science & Application;Jan2012, Vol. 3 Issue 1, p100
Academic Journal
Abstract- Authentication in vertical Hand over is a demanding research problem. Countless methods are commenced but all of them have insufficiencies in term of latency and packet loss. Standard handover schemes (MIPv4, MIPv6, FMIPv6, and HMIPv6) also practice these shortages when a quick handover is desirable in several genuine circumstances like MANETs, VANETs etc. This paper will evaluate the literature of the work done in past and present for undertaking the authentication concerns in vertical handover and will put down a basis for building the latency and packet loss more effective in such a huge shared situation that can produce to an extremely bulky level. This effort will mostly focus on the existing tendency in vertical handover mostly with the authentication, latency and packet loss issues.


Related Articles

  • Performance Modelling and Analysis of Asymmetric Networks over Medium Access Control Layer. Talwar, Meenu; Kang, Sandeep Singh // International Journal of Computer Science & Network Security;Nov2013, Vol. 13 Issue 11, p84 

    Ad hoc networks usually refer to networks created for a special purpose. They can be established every time and everywhere, and they are usually comprised of a group of workstations or other wireless devices that communicate directly with each other to exchange information. Usually there is no...

  • Security Issues & Challenges in Wireless Mesh Networks. Singh, Umesh Kumar; Mewada, Shivlal // International Journal of Advanced Research in Computer Science;Sep/Oct2011, Vol. 2 Issue 5, p301 

    Wireless Mesh Network (WMN) is a new wireless networking paradigm. Unlike traditional wireless networks, WMNs do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Wireless internet service providers are choosing WMNs to offer Internet...

  • Efficient Content Authentication in Ad-Hoc Networks-Mitigating DDoS Attacks. Joshi, Anuj; Agrawal, Krishna Kant; Arora, Deepak; Shukla, Shashwat // International Journal of Computer Applications;Jun2011, Vol. 23, p35 

    With the emergence of mobile ad hoc networks it is now possible to access network accessing and communicate data in an area where no fixed infrastructure exists or existing infrastructure is not available. Since in ad hoc networks, the exact copies of the same content are stored at various...

  • SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECURITY MECHANISM. Sari, Arif; Necat, Beran // International Journal of Ad Hoc, Sensor & Ubiquitous Computing;Jun2012, Vol. 3 Issue 3, p79 

    The varieties of studies in the literature have been addressed by the researchers to solve security dilemmas of Mobile Ad-Hoc Networks (MANET). Due to the wireless nature of the channel and specific characteristics of MANETs, the radio interference attacks cannot be defeated through conventional...

  • Cooperation Enforcement Among Selfish Nodes in Ad Hoc Networks under Noise. Dongbin Wang; Mingzeng Hu; Hui Zhi; Jianwei Ye // Information Technology Journal;2009, Vol. 8 Issue 5, p757 

    In ad hoc networks, the source node can take help of the intermediate nodes to communicate with the destination node by relaying the packets hop by hop. But nodes are constrained with limited resources, so nodes tend to be selfish and cooperative behaviour in forwarding packets for others can...

  • QOS ENHANCED HYBRID MULTIPATH ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS. Devi, P. Rama; Rao, D. Srinivasa // International Journal of Distributed & Parallel Systems;Nov2012, Vol. 3 Issue 6, p89 

    In Mobile ad hoc networks (MANET), the quality of service (QoS) depends on the available resources in the network and node mobility as mobility may result in frequent route failures. Some existing hybrid approach of multi-path routing technique rarely considers QoS metrics for path selection. In...

  • PERFORMANCE ANALYSIS OF MANET BEFORE AND AFTER BLACK HOLE ATTACK. Bhalla, Heena // International Journal of Computer Technology & Applications;2012, Vol. 3 Issue 1, p273 

    A Mobile ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes....

  • Analysis of FSR, LANMAR and DYMO under MANET. Kaur, Satveer; Khurana, Shivani // International Journal on Recent Trends in Engineering & Technolo;Jan2014, Vol. 10 Issue 1, p159 

    A movable ad hoc system (MANET) is a self-configuring communications set of connections of mobile procedure associated by wireless. Each mechanism in a MANET is free to move independently in some way, and will therefore modify its relations to other devices frequently [2]. The primary purpose of...

  • Network Coding-Based Priority-Packet Scheduler Multipath Routing in MANET using Fuzzy Controllers. Baolin Sun; Xiaocheng Lu; Chao Gui; Min Luo // International Journal of Future Generation Communication & Netwo;Apr2014, Vol. 7 Issue 2, p137 

    A Mobile Ad Hoc Network (MANET) is a dynamic wireless network that can be formed without the need for any pre-existing infrastructure in which each node can act as a router. Due to bandwidth constraint and dynamic topology of mobile ad hoc networks, multipath supported routing is a very...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics