Policy-Based Security Management System for 5G Heterogeneous Networks
نویسندگان
چکیده
منابع مشابه
Security management system for 4G heterogeneous networks
—In recent years, there have been major developments in, and deployment of, diverse mobile technology. Security issues in mobile computing are now presenting significant challenges. The ability to move from one network to another, and from one provider to another creating thus vertical and horizontal handoffs, has increased the complexity of mobile security. There are many research groups, such...
متن کاملPolicy Based Mobility & Flow Management for IPv6 Heterogeneous Wireless Networks
We propose a dynamic mobility management framework for Internet Protocol version 6 (IPv6) and policy enforcement enabled heterogenous wireless networks. Policies and policy rules are defined depending on network infrastructure facilities, service agreements and negotiation results. Each traffic is coupled with an identifiable traffic flow while the heterogenous interface flowbindings are regula...
متن کاملAdaptive Policy Based Access Management in Heterogeneous Wireless Networks
The next generation of mobile networks is expected to utilise multiple radio access technologies, seamlessly integrated to form a heterogeneous wireless network. On the arrival of a new call or inter-system handover request, the network operator must assign an access network to the user. Selecting the most optimal network from those available and controlling network access is an important consi...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملPolicy-Based Security for M-Commerce Networks
With the emergence of the wireless application protocol (WAP Forum, 2000) in 1998, which provided users of mobile devices with an optimized wireless protocol to access the Internet and to browse specific Web content, and with the introduction of specialized wireless programming models such as Java 2 Mobile Edition (J2ME) (Lawton, 2002), the .Net Compact Framework (Neable, 2002), and the Binary ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Communications and Mobile Computing
سال: 2019
ISSN: 1530-8669,1530-8677
DOI: 10.1155/2019/4582391