02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TRUST ASSISTED HANDOVER ALGORITHM FOR RELIABLE HANDOVER<br />

POA provides the NTC data (network trust <strong>in</strong>formation) of its neighbour<strong>in</strong>g POAs to<br />

the attached mobile user us<strong>in</strong>g the active connection. The mobile user stores this<br />

received network trust <strong>in</strong>formation about the surround<strong>in</strong>g POAs for future use (for<br />

example, when it moves out of the radio coverage of the serv<strong>in</strong>g POA.). Dur<strong>in</strong>g a<br />

handover, both network trust relations and QoS are considered. This enables a much<br />

more reliable handover strategy when a mobile user is deal<strong>in</strong>g with multiple network<br />

operators.<br />

To br<strong>in</strong>g trust awareness to the THOA, a new metric named trust coefficient ( � n ) is<br />

<strong>in</strong>troduced. The trust coefficient normalises the NTC data derived through the NTC<br />

model as described <strong>in</strong> Chapter 4. The value of trust coefficient is expected to be<br />

<strong>in</strong>versely proportional to the numerical value of the NTC obta<strong>in</strong>ed from the NTC model<br />

such as the Trust Association Hop (TAH) based on the one shown <strong>in</strong> Figure 4.3. The<br />

mobile user MH ma<strong>in</strong>ta<strong>in</strong>s a local network trust coefficient table for network selection,<br />

<strong>in</strong>stead of a 3GPP specified user controlled or operator controlled identifier list [72].<br />

The update of this trust coefficient table is largely determ<strong>in</strong>ed by the MH’s location.<br />

Table 5.1 is illustrated as an example of the trust coefficient table that can be built for<br />

the scenario of Figure 5.2. An entry can be created for each network that is <strong>in</strong>volved <strong>in</strong><br />

the neighbour NTC pattern regardless of the access technology it is based on.<br />

Table 5.1 An example of network trust coefficient table for network selection<br />

Network ID/<br />

Operator ID<br />

Relationship to HPLMN Trust Coefficient<br />

HPLMN -- 1<br />

WLAN#1 via VPLMN#1 0.5<br />

WLAN#2 no trust relation with HPLMN 0<br />

WLAN#3 via PLMN#2, WLAN#1 and PLMN#1 0.2<br />

PLMN#1 directly connected to HPLMN 0.8<br />

PLMN#2 no trust relation with HPLMN 0<br />

PLMN#3 directly connected to HPLMN 0.8<br />

With the candidate network’s NTC <strong>in</strong>formation, the MH can work out which candidate<br />

networks should be avoided dur<strong>in</strong>g the network selection because of lack of trust<br />

relationship due to low trust coefficiency. If two access networks appear to have the<br />

same amount of NTC with the home network (e.g. WLAN#3 and PLMN#1 <strong>in</strong> Figure<br />

- 90 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!