02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

INTRODUCTION<br />

network trust pattern of its nearby networks us<strong>in</strong>g mobile users’ handover records<br />

without rely<strong>in</strong>g on direct l<strong>in</strong>ks with its neighbours. In this scheme, a mobile user can<br />

obta<strong>in</strong> necessary network trust <strong>in</strong>formation dynamically from its serv<strong>in</strong>g access network,<br />

and thus has sufficient flexibility to work with a large number of network operators.<br />

In Chapter 5, a network trust <strong>in</strong>formation assisted handover algorithm is presented for<br />

handover <strong>in</strong> a multi-operator environment. On a cost basis, the proposed algorithm uses<br />

network trust relationship <strong>in</strong> additional to other handover metrics such as signal strength,<br />

delay, network load and so forth. This provides a mobile user with an <strong>in</strong>telligent<br />

approach of deal<strong>in</strong>g with complex trust relationships between network operators.<br />

Accord<strong>in</strong>g to the proposed algorithm, network trust <strong>in</strong>formation that is needed <strong>in</strong> a<br />

handover can be considered as an <strong>in</strong>tegral part of handover decision algorithm rather<br />

than as a separated add-on. This effectively avoids unnecessary handover attempts, and<br />

ensures reliable handover <strong>in</strong> a multi-operator environment. The algorithm can work<br />

without compromis<strong>in</strong>g Quality of Service (QoS).<br />

Chapter 6 <strong>in</strong>troduces a proxy-based authentication localisation scheme for handover<br />

between networks without a trust relation. The proposed scheme presents a method of<br />

relay<strong>in</strong>g a mobile’s home network’s authentication authority to a third party proxy<br />

based on a proposed trust association model. To provide secure and controllable<br />

authentication localisation, a set of fast authentication related algorithms are presented.<br />

The proposed trust association model along with the fast authentication algorithms<br />

enable the authentication required <strong>in</strong> a handover to be locally processed. This avoids<br />

resort<strong>in</strong>g to the home AAA server for identity verification <strong>in</strong> a handover. The proposed<br />

scheme is particularly effective for the handover tak<strong>in</strong>g place between two networks<br />

without a trust relation, and can result <strong>in</strong> great performance improvement.<br />

In Chapter 7, a generic multi-<strong>in</strong>terface mobile term<strong>in</strong>al model is described. The<br />

proposed model provides a multi-<strong>in</strong>terface architecture that supports multiple<br />

<strong>heterogeneous</strong> network <strong>in</strong>terfaces be<strong>in</strong>g alternatively used and media <strong>in</strong>dependent<br />

handover. Its design focus is to enable the multi-<strong>in</strong>terface function and support ord<strong>in</strong>ary<br />

upper layer protocols such as TCP/IP and Mobile IPv4 at the mobile end without<br />

modify<strong>in</strong>g <strong>wireless</strong> network <strong>in</strong>frastructure already <strong>in</strong> use. This makes sure that the<br />

proposed model that is compatible with the latest IEEE 802.21 standard can be<br />

- 7 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!