[show abstract][hide abstract] ABSTRACT: Next generation networks will comprise different wireless networks including cellular technologies, WLAN and indoor technologies. To support these heterogeneous environments, there is a need to consider a new design of the network infrastructure. Furthermore, this heterogeneous environment implies that future devices will need to roam between different networks using vertical handover techniques. When a mobile user moves into a new foreign network, data confidentiality and mutual authentication between the user and the network are vital issues in this heterogeneous environment. This article deals with these issues by first examining the implication of moving towards an open architecture, and then looking at how current approaches such as the 3GPP, HOKEY and mobile ethernet respond to the new environment while trying to address the security issue. The results indicate that a new authentication and key agreement protocol is required to secure handover in this environment. Casper/ FDR, is used in the analysis and development of the protocol. The proposed protocol has been proven to be successful in this heterogeneous environment
EURASIP Journal on Wireless Communications and Networking 02/2012; · 0.54 Impact Factor
[show abstract][hide abstract] ABSTRACT: Mobile devices with two network interfaces (WiFi and 3G) are already commercially available. Point- to-point communications such as Infrared and Bluetooth are also readily used. In the near future, mobile phones will have several interfaces including satellite and new technologies such as Ultrawideband. Hence we must as- sume that such devices will be multi-homed by default. For various reasons, including network congestion, network resilience and increased endpoint bandwidth, there have been several attempts to address multi-homing. Hetero- geneous environments with the need to support vertical handover introduce another set of issues which make the need to solve multi-homing problems more urgent. This paper outlines the issues, looks at past efforts and proposes a solution based on the Location Id/Node Id concept but also argues that additional support is needed to make such an approach efficient for heterogeneous environments. Index Terms—Multi-homing, Heterogeneous Networks, Y-Comm Framework
1st International Workshop on Protocols and Applications with Multi-Homing Support. 01/2011;
[show abstract][hide abstract] ABSTRACT: Several research groups are working on designing
new security architectures for 4G networks such as Hokey and
Y-Comm. Since designing an efficient security module requires
a clear identification of potential threats, this paper attempts to
outline the security challenges in 4G networks. A good way to
achieve this is by investigating the possibility of extending
current security mechanisms to 4G networks. Therefore, this
paper uses the X.805 standard to investigate the possibility of
implementing the 3G’s Authentication and Key Agreement
(AKA) protocol in a 4G communication framework such as YComm.
The results show that due to the fact that 4G is an
open, heterogeneous and IP-based environment, it will suffer
from new security threats as well as inherent ones. In order to
address these threats without affecting 4G dynamics, Y-Comm
proposes an integrated security module to protect data and
security models to target security on different entities and
hence protecting not only the data but, also resources, servers
Keywords- 4G systems
Sixth Advanced International Conference on Telecommunications, AICT 2010, 9-15 May 2010, Barcelona, Spain; 01/2010
[show abstract][hide abstract] ABSTRACT: The Next Generation Internet will provide ubiquitous
computing by the seamless operation of heterogeneous
wireless networks. It will also provide support for quality-ofservice,
QoS, fostering new classes of applications and will have
a built-in multi-level security environment. A key requirement
of this new infrastructure will be support for efficient vertical
handover. Y-Comm is a new architecture that will meet the
challenge of this new environment. This paper explores the design
of efficient imperative handover mechanisms using the Y-Comm
Framework. It first looks at different types of handovers, then
examines the Y-Comm Framework and shows how Y-Comm
maps unto current mobile infrastructure. It then explores support
for different handover mechanisms using Y-Comm. Finally, it
highlights the development of a new testbed to further investigate
the proposed mechanisms.
NBiS 2009, 12th International Conference on Network-Based Information Systems, Indianapolis, Indiana, USA, 19-21 August 2009; 01/2009
[show abstract][hide abstract] ABSTRACT: In the near future mobile devices with several inter-faces will become commonplace. Most of the pe-ripheral networks using the Internet will therefore employ wireless technology. To provide support for these devices, this paper proposes a new framework which encompasses the functions of both peripheral and core networks. The new architecture is called Y-Comm and is defined in a layered manner like the OSI model.
[show abstract][hide abstract] ABSTRACT: This paper describes work centred around providing greater autonomy for mobile nodes to roam in Mobile IPv6 wireless networks based on a new handoff mechanism. This technique, called the Client-based Handoff, enables mobile nodes to roam in foreign wireless networks without having to be controlled by the network infrastructure. The mechanism incorporates three algorithms: a router advertisement cache, the invocation of TCP mechanisms and techniques to handle subnetwork outages in order to reduce packet loss and handoff latency. An experimental Mobile IPv6 testbed was developed to evaluate the proposed mechanism and is described in this paper. The testbed supports both horizontal and vertical handoffs. Experimental results are also presented. The outcome of this approach was used to support mobile thin-client computing using a Virtual Network Computer (VNC) environment. Relevant experiments were carried out and the results show a compelling improvement in throughput of up to 50% compared to a VNC environment without the supporting architecture.
Mobile Computing and Communications Review. 01/2006; 10:13-33.
WINSYS 2006 - Proceedings of the International Conference on Wireless Information Networks and Systems, Setúbal, Portugal, August 7-10, 2006, WINSYS is part of ICETE - The International Joint Conference on e-Business and Telecommunications; 01/2006
[show abstract][hide abstract] ABSTRACT: Experimental activities play a vital role in the deployment and development of novel radio access networks. In particular the movement from 3G to 4G poses new challenges, which need to be solved using practical approaches such as testbeds. This paper presents a testbed that can be regarded as an early attempt to build a 4G system. It fully integrates heterogeneous wireless technologies using a loosely-coupled architecture. Also, experimental results are included to show the possibilities of this setup.
1st International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2005), 23-25 February 2005, Trento, Italy; 01/2005
[show abstract][hide abstract] ABSTRACT: In the near future mobile devices with several interfaces will be-come commonplace. Most of the peripheral networks using the Internet will therefore employ wireless technology. To provide support for these devices, this paper proposes a new framework which encompasses the functions of both peripheral and core net-works.The framework is called Y-Comm and is defined in a layered manner like the OSI model.