Handover authentication latency reduction using mobile edge computing and mobility patterns

نویسندگان

چکیده

With the advancement in technology and exponential growth of mobile devices, network traffic has increased manifold cellular networks. Due to this reason, latency reduction become a challenging issue for devices. In order achieve seamless connectivity minimal disruption during movement, is crucial handover authentication process. Handover process which legitimacy node checked when it crosses boundary an access network. This paper proposes efficient technique that utilizes mobility patterns Edge computing framework reduce latency. The key idea proposed categorize nodes on basis their patterns. We perform simulations measure networking Besides, we use queuing model processing time query at servers. results show approach reduces up 54% comparison with existing approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Homomorphic Handover Authentication Technique for Mobile Cloud Computing

Mobile Cloud Computing has brought the IT industry to a new level by providing an innovative technique with the help of which one can access anything, anytime from anywhere. It is an industry buzz word since 2009 and a relatively new concept that combines cloud computing, mobile computing and wireless networking. This technology has uplifted the usability experience of mobile users. Over the pa...

متن کامل

Secured Route Optimization and Micro-mobility with Enhanced Handover Scheme in Mobile IPv6 Networks

خسارات وارد شده به شبکه گاز شهری در یک زلزله می­تواند زیان­های زیادی از جمله خسارت ناشی از آتش­سوزی در شبکه زیر ساخت، و خسارت ناشی از قطع خدمات رسانی، تعمیر و تعویض اعضای شبکه، را در بر داشته باشد. در این مقاله یک مدل آتش­سوزی پیشنهاد شده است. مدل پیشنهادی در یک مدل نیمه احتمالاتی مرسوم برای برآورد خسارت­های مختلف ناشی از آسیب دیدن شبکه گاز شهری، به کار برده شده است. هدف از این کار توسعه یک ابز...

متن کامل

Reliable Distributed Authentication in Multi-Access Mobile Edge Computing

The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...

متن کامل

Simulation Study of Low Latency Network Architecture Using Mobile Edge Computing

Attaining extremely low latency service in 5G cellular networks is an important challenge in the communication research field. A higher QoS in the next-generation network could enable several unprecedented services, such as Tactile Internet, Augmented Reality, and Virtual Reality. However, these services will all need support from powerful computational resources provided through cloud computin...

متن کامل

Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing

Various wireless communication technologies have been generated and deployed on account of mass requirements. These enable cloud computing with integration with mobility and Mobile Cloud Computing (MCC) becomes the trend of future generation computing paradigm. In this paper, we address a challenging issue of MCC technology security and privacy of the handover process. We propose a new design o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computing

سال: 2021

ISSN: ['0010-485X', '1436-5057']

DOI: https://doi.org/10.1007/s00607-021-00969-z