999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Enhance Vertical Handover Security During Execution Phase in Mobile Networks

2022-08-24 07:02:48OmarKhattab
Computers Materials&Continua 2022年8期

Omar Khattab

Department of Computer Science and Engineering,Kuwait College of Science and Technology(KCST),Kuwait

Abstract: The Vertical Handover (VHO) is one of the most vital features provided for the heterogeneous mobile networks.It allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between different Radio Access Technologies(RATs)such as Wireless Fidelity (Wi-Fi),Global System for Mobile Communication (GSM),Universal Mobile Telecommunications System (UMTS),Long Term Evolution(LTE) and Fifth Generation (5G).In order to fulfill this goal,the VHO must comply to three main phases:starting of collecting the required information and then passing it for decision phase to obtain the best available RAT for performing VHO by execution phase eventually.However,the execution phase still encounters some security issues which are exploited by hackers in launching malicious attacks such as ransomware,fragmentation,header manipulation,smurf,host initialization,reconnaissance,eavesdropping,Denial of Service (DoS),spoofing,Man in the Middle (MITM) and falsification.This paper thoroughly studies the recent security issues for hundreds VHO approaches found in the literature and comes up with a secure procedure to enhance VHO security during execution phase.A numerical analysis results of the proposed procedure are effectively evaluated in terms of security and signaling cost.Compared with the recent related work found in literature,the analysis demonstrates that the security is successfully improved by 20%whereas signaling cost is maintained as in non-proposed procedure.

Keywords: Vertical handover security;mobile networks;wireless networks;heterogeneous wireless networks

1 Introduction

Maintaining ongoing sessions over heterogeneous mobile networks is becoming an essential demand for the MUs during their movements.This process of switching between different RATs is referred to as VHO which is implemented via Initiation Phase(IP),Decision Phase(DP)and Execution Phase(EP)[1-8].There are three main types of information which should be considered for securing seamless VHO,as shown in Fig.1:a)network’s parameters such as latency and coverage area,b)MU’s preferences parameters such as cost of service and security and c)terminal’s parameters such as battery and velocity.The operators always strive to make a balance between MU’s preferences and optimum use of the network by making a seamless VHO as much as possible.This helps operators in attracting more number of subscribers and hence increasing their profit accordingly.However,the security as one of the most critical parameters from MU’s side must be considered carefully by the operators.Therefore,this paper thoroughly studies the recent security issues for hundreds VHO approaches found in the literature and proposes a secure procedure to enhance VHO security during execution phase.The rest of the paper is organized as follows:In Section 2,related works are presented.In Section 3,a design of the proposed procedure is presented.In Section 4,a numerical analysis is presented.In Section 5,performance evaluation and results discussion are presented.Finally,a conclusion is given in Section 6.

Figure 1:Main VHO parameters:networks,MUs and terminals

2 Related Works

In this section,174 previous works have been considered.In [9],132 VHO research works have been classified into two main categories:VHO security based category and VHO non-security based category.It has been concluded in[9]that the VHO non-security category presented a modest number of previous works(7%).In[10-21],many recent VHO research works have been proposed which also have not considered VHO security.In[22],22 security mechanisms proposed on securing the Mobile IPv6 handover have been surveyed [23-44].It has been concluded in [22]that it is still vulnerable to various malicious activities.In [45],a new proactive security algorithm for upcoming sensitive connection between heterogeneous mobile networks was proposed:Proactive Security for Upcoming Sensitive Connection (PSUSC).The PSUSC algorithm descendingly orders all available RATs in terms of security into two levels [2],as shown in Tab.1.When the VHO is triggered for a security session,the PSUSC’s priority is to secure the upcoming sensitive session and it therefore selects the best available secure RAT,taking into consideration that the sole VHO to 5G (L1) is dynamically taken place without MUs’confirmation.Otherwise,the MU could confirm proceeding VHO from available L2’s RATs.An analysis of the PSUSC algorithm for the decision phase has proved reducing potential attacks compared with previous works which rely on using less secure RAT.However,no performance evaluation or validation provided about the execution phase where attackers may lunch their malicious attacks due to using less secure RAT in sending sensitive date,as shown in Fig.2.Some security issues have been surveyed in[46]:fragmentation,header manipulation,smurf(broadcast amplification),host initialization and reconnaissance.Besides eavesdropping,DoS,spoofing,MITM,falsification and ransomware in[47-51]and[52],respectively.

Table 1:Security comparison of RATs[45]

Figure 2:The penetrated PSUSC algorithm[45]

3 Design of Proposed Procedure

In Section 2,hundreds VHO approaches have been surveyed.It has been noticed that only [45]has considered a proactive security for upcoming sensitive connection in decision phase.However,no performance evaluation or validation provided about the execution phase where attackers may lunch their malicious attacks due to using less secure RAT in sending sensitive date.Therefore,for VHO execution phase,this section proposes a secure procedure compared with non-proposed procedure[45]which relies on using less secure RAT.This is shown Fig.3,where the green arrows are referred to the proposed procedure and the orange arrows are referred to the non-proposed procedure.Once the VHO is triggered for a security session,instead of sending MU’s sensitive packets over old less secure RAT(steps:2,3,4:MU-Old RAT-Internet-Corresponding Node(CN)),while VHO is taking place(step:1:Old RAT-New RAT),the proposed procedure sends concurrent signals to inform both of VHO to start its phases(step:1a:Old RAT-New RAT)and MU to make use of the VHO period to start buffering MU’s sensitive packets(step:1b:MU).After that the MU starts to sending its sensitive packets over secure RAT to the CN(steps:2,3,4:MU-New RAT-Internet-CN).

Figure 3:The design of proposed procedure

4 Numerical Analysis

In this section,a numerical analysis for security and signaling cost is presented in order to evaluate the performance of the proposed procedure during the VHO execution phase compared with nonproposed procedure.This is shown in Fig.4.

Figure 4:The analysis of proposed procedure vs.non-proposed procedure

The signaling cost of each of two procedures is as follows:

a.None-proposed procedure

whereVSA_sc,SP,IP,DPandEPare referred to signaling cost of Vulnerable Session Attacks,

Sensitive Packet,Initiation Phase,Decision Phase and Execution Phase,respectively.

From(1),

wherePsis referred to Phases

From(2),

b.Proposed procedure

whereNVSA_SCis referred to signaling cost of None-Vulnerable Session Attacks.

From(4),

From(5),

The security of each of two procedures is as follows:

a.None-proposed procedure

whereVSA_secis referred to security of Vulnerable Session Attacks.Mis referred to Metric(5,4,3,2,1 to 5G,LTE,UMTS,(WiMAX,GSM)and WiFi,respectively).PSVHOis referred to Proactive Secure VHO and it is assumed to be 3(VHO phases).

b.Proposed procedure

whereNVSA_secis referred to security of None-Vulnerable Session Attacks.

5 Performance Evaluation and Results Discussion

In this section,the performance of security and signaling cost of the two procedures:proposed procedure and none-proposed procedure are evaluated where four VHO scenarios between RATs are considered:Wi-Fi to 5G,Wi-Fi to LTE,Wi-Fi to UMTS and Wi-Fi to WiMAX/GSM.

From Tab.2,it can be seen that the security is successfully improved by 20%compared with noneproposed procedure,as shown in Figs.5-8.This obviously due to early buffering sensitive packets.From Tab.3,it can be seen that the signaling cost is maintained as in non-proposed procedure,as shown in Fig.9.

Table 2:Parameters of VHO security

Figure 5:VHO from Wi-Fi to 5G

Figure 6:VHO from Wi-Fi to LTE

Figure 7:VHO from Wi-Fi to UMTS

Figure 8:VHO from Wi-Fi to WiMAX/GSM

Table 3:Parameters of VHO signaling cost

Figure 9:Signaling cost:proposed procedure vs.non-proposed procedure

6 Conclusion

In this paper,the recent security issues for hundreds VHO approaches have been surveyed thoroughly.It has been noticed that the VHO execution phase still encounters some security issues which are exploited by hackers in launching malicious attacks due to using less secure RAT in sending sensitive date.Therefore,the paper came up with a secure procedure to enhance VHO security during execution phase.A numerical analysis results of the proposed procedure were effectively evaluated against non-proposed procedure in terms of security and signaling cost.The results showed that the security was successfully improved by 20%whereas signaling cost was maintained as in non-proposed procedure.

Funding Statement:The author received no specific funding for this study.

Conflicts of Interest:The author declares that he has no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 亚洲乱码在线播放| 欧美日韩免费观看| 国产精品三级专区| 亚洲天堂久久| 中文字幕无码制服中字| 麻豆国产精品| 国产成a人片在线播放| 亚洲熟女偷拍| 91口爆吞精国产对白第三集| 国产丝袜无码一区二区视频| 91色在线视频| 91精品国产自产在线老师啪l| 高h视频在线| 四虎免费视频网站| 日韩精品无码一级毛片免费| 亚洲中字无码AV电影在线观看| 国产精品30p| 日韩黄色精品| 小蝌蚪亚洲精品国产| 国产丰满大乳无码免费播放| 蜜桃视频一区| 91久久偷偷做嫩草影院电| 97视频免费在线观看| 精品久久国产综合精麻豆| 亚洲综合色区在线播放2019| 国产一区二区人大臿蕉香蕉| 综合色在线| 无码网站免费观看| 狠狠亚洲五月天| 日韩高清一区 | 亚洲中文字幕97久久精品少妇| 亚洲日本中文字幕天堂网| 亚欧成人无码AV在线播放| 五月婷婷丁香综合| 免费全部高H视频无码无遮掩| 制服丝袜一区| 99久久99这里只有免费的精品| 国产一区二区精品福利| 色悠久久久久久久综合网伊人| 四虎永久免费地址| 欧美色综合网站| 国产精品人莉莉成在线播放| 日本在线视频免费| 欧美一级高清免费a| 青青青国产视频手机| 精品人妻一区无码视频| 午夜色综合| 熟女视频91| 伊人五月丁香综合AⅤ| 日韩在线播放中文字幕| 国产欧美日韩精品综合在线| 欧美高清视频一区二区三区| 亚洲婷婷在线视频| 在线看片免费人成视久网下载| 国产欧美视频综合二区| 免费一级毛片在线观看| 一本久道久综合久久鬼色| 操国产美女| 久久精品视频亚洲| 欧美中文字幕在线二区| www.日韩三级| 国产欧美日韩va| 波多野结衣一区二区三区四区视频 | 国产精品99在线观看| 大学生久久香蕉国产线观看| 久久 午夜福利 张柏芝| 中文字幕中文字字幕码一二区| 欧美一区二区三区香蕉视| 四虎综合网| 九色视频线上播放| 日韩天堂网| 日本黄色a视频| 女人18毛片一级毛片在线 | 亚洲欧美成人| 亚洲天堂免费在线视频| 亚洲国产天堂久久九九九| 亚洲国产综合自在线另类| 性欧美久久| 人妻中文字幕无码久久一区| 亚洲中文字幕国产av| 内射人妻无套中出无码| 国产成人综合亚洲网址|