25,398 Hits in 9.4 sec

Unified Heterogeneous Networking Design

Amandeep Singh, Gaston Ormazabal, Henning Schulzrinne, Yan Zou, Peter Thermos, Sateesh Addepalli
2013 Proceedings of Principles, Systems and Applications on IP Telecommunications - IPTComm '13  
Networks are heterogeneous in terms of access technologies (Wi-Fi, LTE, WiMAX, satellite), service providers, performance and cost.  ...  Users can access Internet applications from many locations (home, office, outdoors), devices (PC, smartphone, tablet) and from more than one network at a time. 3) Policy management: Users should be able  ...  ACKNOWLEDGEMENTS This work was funded in part, by generous gifts from the Silicon Valley Community Foundation, and New York Center for Advance Technology -Telecommunications (CATT).  ... 
doi:10.1145/2589649.2554670 dblp:conf/iptcomm/SinghOSZTA13 fatcat:5zlgnpaobngbnn37jtm7zvwhju

A uniform AAA handling scheme for heterogeneous networking environments

Daniel Granlund, Karl Andersson, Muslim Elkotob, Christer Ahlund
2009 2009 IEEE 34th Conference on Local Computer Networks  
Starting with an efficient mobility management scheme for heterogeneous wireless networks, this paper proposes a solution for AAA handling using a common database for storing user information.  ...  Regardless of the access technology selected, user@realm identities are used for authentication, authorization, and accounting.  ...  RELATED AND FUTURE WORK We are combining mobility management and AAA solutions for heterogeneous networking environments.  ... 
doi:10.1109/lcn.2009.5355059 dblp:conf/lcn/GranlundAEA09 fatcat:gbmidprasvdutef5wi7mtfeeza

Technology Integration Framework for Fast and Low Cost Handovers—Case Study: WiFi-WiMAX Network

Mohamed Kassab, Jean-Marie Bonnin, Abdelfettah Belghith
2010 Journal of Computer Systems, Networks, and Communications  
This task is even more important when management services, like security and quality of service (QoS), are deployed at access technology level.  ...  These networks are required to achieve performances equivalent to classic wireless networks by ensuring the continuity of communications and the homogeneity of network management during horizontal and  ...  It defines the physical layer design and the wireless medium access mechanism and network services such as the QoS management, mobility management, user authentication, and accounting for wireless part  ... 
doi:10.1155/2010/205786 fatcat:7vz34savbzbopgx77rd27oaz7e

Wireless networking security: open issues in trust, management, interoperation and measurement

Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
2006 International Journal of Security and Networks (IJSN)  
He has more than 10 years of professional engineering experience providing network security and network management analysis, design and implementation for telecommunication carriers, ISPs and enterprises  ...  He is actively researching probabilistic solutions to network security and network management problems, and has served as lead investigator on federally funded research on coordinating pervasive wireless  ...  Community meshes for public access typically have access to infrastructure for authentication and access control, and as such are able to take advantage of the same techniques as used in hotspot architectures  ... 
doi:10.1504/ijsn.2006.010825 fatcat:glcvloozrbfyzb5hwjom3sjseq

Handling mobility across WiFi and WiMAX

Anand Padmanabha Iyer, Jayaraman Iyer
2009 Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing Connecting the World Wirelessly - IWCMC '09  
Performance of wireless data networks can be improved by integrating heterogeneous networks. Hence, emerging wireless Internet networks consist of heterogeneous wireless networks working in synergy.  ...  Our approach does not require additional client software to handle WiFi-WiMAX mobility, or hardware changes in any of the network entities involved.  ...  Handling Authentication Across Heterogeneous Networks One of the major advantages of our proposal is that it can handle authentication across heterogeneous networks.  ... 
doi:10.1145/1582379.1582496 dblp:conf/iwcmc/IyerI09 fatcat:bzds37lqfbgqfjji2ntfei6ive

Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network

Seonghyeon Gong, Abir EL Azzaoui, Jeonghun Cha, Jong Hyuk Park
2020 Applied Sciences  
The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network  ...  However, this authentication mechanism can cause a signaling storm in the Non-Access Stratum (NAS) because the end node needs to communicate with the authentication server of the NAS area.  ...  Auditability 5G networks must be able to monitor and manage the access of heterogeneous devices to data networks and services.  ... 
doi:10.3390/app10020727 fatcat:vsbpwjl6ebhdrblfeaevscezsq

Security middleware approaches and issues for ubiquitous applications

Jameela Al-Jaroodi, Imad Jawhar, Alyaziyah Al-Dhaheri, Fatmah Al-Abdouli, Nader Mohamed
2010 Computers and Mathematics with Applications  
Middleware is an essential layer in the architecture of these new systems, and recently, more emphasis has been put on security middleware as an enabling component for ubiquitous applications.  ...  This is due to the high levels of personal and private data sharing in these systems.  ...  We would also like to thank the anonymous reviewers for their valuable comments and suggestions that helped us produce a more concise article.  ... 
doi:10.1016/j.camwa.2010.01.009 fatcat:ds73w7jfo5ejvpdpwlgtmq2lba

Testbed for mobile network operator scenarios

F. Steuer, M. Elkotob, S. Albayrak, A. Steinbach
2006 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006.  
The diversity of multi-mode devices is growing rapidly. These factors have a significant impact on the services running on top of this broad range of different access network technologies.  ...  Wired, wireless, and mobile networks are converging to an all IP heterogeneous network with immense complexity. The underlying access network technologies have a high variance of characteristics.  ...  Quality of Service Resource management mechanisms and Quality of Service (QoS) guarantees in heterogeneous environments are an important precondition for the operation of next-generation multimedia services  ... 
doi:10.1109/tridnt.2006.1649155 dblp:conf/tridentcom/SteuerEAS06 fatcat:tba7vt4krvgbbpdu6ffmx5khbi

IEEE802.21 Optimized handover delay for proxy Mobile IPV6

Linoh A. Magagula, H. Anthony Chan
2008 MILCOM 2008 - 2008 IEEE Military Communications Conference  
Interworking of these heterogeneous wireless networks will provide ubiquitous access to roaming network users.  ...  This paper analyzes the reduction of handover delay in a network-based localized mobility management framework assisted by IEEE 802.21 Media Independent Handover services.  ...  The network is responsible for managing IP mobility on behalf of the MN. A typical PMIPv6 domain is shown in Fig. 1 .  ... 
doi:10.1109/milcom.2008.4753331 fatcat:e2hlrbbmf5ftxmrsnvh4zzul3y

Editorial: Special Issue on "Recent Advances in Mobile and Wireless Networks"

Der-Jiunn Deng, Chih-Cheng Tseng, Tony Q. S. Quek, Nirwan Ansari
2015 Wireless personal communications  
Mobile and wireless networks are enabling a myriad of services and applications.  ...  These challenges motivate us to design and develop new protocols, architectures and services for future mobile and wireless networks.  ...  His research interests include the design and performance evaluation of protocols for the next generation mobile communications and wireless ad hoc/sensor networks. He is a member of IEEE.  ... 
doi:10.1007/s11277-015-3034-6 fatcat:ihnsxx2rwzd6vitikcvzhfvikm

A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards

Nitin Naik, Paul Jenkins
2016 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)  
Managing digital identities and access control for cloud users and applications remains one of the greatest challenges facing cloud computing today.  ...  It may not be necessary that the same IAM standards are equally effective for MCC. To determine the appropriateness of these IAM standards for MCC requires some IAM performance evaluation criteria.  ...  Fig. 1 : 1 Identity and Access Management (IAM) Components II. IDENTITY AND ACCESS MANAGEMENT EVALUATION CRITERIA FOR MOBILE CLOUD COMPUTING  ... 
doi:10.1109/mobilecloud.2016.22 dblp:conf/mobilecloud/NaikJ16 fatcat:yuwn2k4rvnhsxicg6r7kdg4z2u

Bandwidth Efficient Mobility Management for Heterogeneous Wireless Networks

Karl Andersson, Daniel Granlund, Muslim Elkotob, Christer Åhlund
2010 2010 7th IEEE Consumer Communications and Networking Conference  
An important feature of the upcoming fourth generation wireless networks is support for heterogeneous radio access technologies in combination with an all-IP type of overall architecture.  ...  Furthermore, it does not add any signaling overhead and outperforms existing mobility management schemes for heterogeneous environments in terms of bandwidth consumption.  ...  ACKNOWLEDGMENT The work presented in this paper is based on results from the HybriNet@Skellefteå, Mobile & Open Service Access, and BasicNet projects supported by Skellefteå Kraft, EU structural funds  ... 
doi:10.1109/ccnc.2010.5421742 dblp:conf/ccnc/AnderssonGEA10 fatcat:xlooopwxwzhgbl4oalxty443ua

A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks [chapter]

Minsoo Lee, Sehyun Park
2005 Lecture Notes in Computer Science  
In this paper, we present the context management framework that exploits the agent technology in mobile communications and services.  ...  In the 4G mobile networks which are expected to be very complex systems interconnecting various technologies, new intelligent services will need to be aware of various contexts.  ...  We focuse mainly on the QoS-awareness in seamless handover. QoSaware vertical handover between heterogeneous networks is one of many possible adaptation methods for seamless services.  ... 
doi:10.1007/11552055_22 fatcat:upokuz2uzfeuhnaieazxgfssga

A ubiquitous mobile communication architecture for next-generation heterogeneous wireless systems

I.F. Akyildiz, S. Mohanty, Jiang Xie
2005 IEEE Communications Magazine  
Acknowledgments This work is supported by the National Science Foundation under contract ANI-0117840.  ...  When an MT is accessible through multiple fully overlapping systems, first, based on the service needs of a user, the best communication network should be determined.  ...  , UMTS, WLAN, etc.). • Network protocols: NGWS will have different protocols for transport, routing, mobility management, and so on.  ... 
doi:10.1109/mcom.2005.1452832 fatcat:qv3o5ttmpzai5l5pfqpxx4ixky

Performance Analysis of Economic Model and Radio Resource Management in Heterogeneous Wireless Networks

Nilkantha Chakraborty
2013 International Journal of Computer Networks & Communications  
Radio resource management (RRM) is the system level control of co-channel interference and other radio transmission characteristics in wireless communication systems.  ...  In this paper we first analyze a utility function based access selection (UFAS) method. Then we investigate a radio resource management and network selection scheme in heterogeneous wireless network.  ...  Mobile nodes in such heterogeneous wireless networks are expected to have the capability of selecting a proper access network to ensure service consistency and continuity.  ... 
doi:10.5121/ijcnc.2013.5513 fatcat:xbbvuodp7zg3tchkxif3sbisla
« Previous Showing results 1 — 15 out of 25,398 results