Key words- Long-Term Evolution (LTE), Multi Hop, Worldwide Interoperable For Microwave Access (Wimax), Elliptic Curve Diffie Hellman (ECDH).

Size: px
Start display at page:

Download "Key words- Long-Term Evolution (LTE), Multi Hop, Worldwide Interoperable For Microwave Access (Wimax), Elliptic Curve Diffie Hellman (ECDH)."

Transcription

1 260 Enhancing the Security and Reliability for Data Transmission in Wireless Networks N.Karpagam 1, S.Nithya 2 II-M.E(CS) 1, Assistant Professor / ECE 2, Dhanalakshmi Srinivasan Engineering College, Perambalur ABSTRACT Microwave Access (WiMAX) and Long-Term Evolution (LTE) are considered the best technologies for vehicular networks. WiMAX and LTE are Fourth-Generation (4G) wireless technologies that have well-defined quality of service (QoS) and security architectures.existing work QoS-aware distributed security architecture using the elliptic curve Diffie Hellman (ECDH) protocol that has proven security strength and low overhead for 4G wireless networks.the proposed distributed security architecture using the ECDH key exchange protocol.ecdh can establish a shared secret over an insecure channel at the highest security strength.limitations of high computational and communication overhead in addition to lack of scalability.so that the proposed work propose an unconditionally secure and efficient SAMA. The main idea is that for each message m to be released, the message sender, or the sending node, generates a source anonymous message authenticator for the message m.the generation is based on the MES scheme on elliptic curves. For a ring signature, each ring member is required to compute a forgery signature for all other members in the AS. IMS (IP Multimedia Subsystem) is a set of specifications to offer multimedia services through IP protocol. These make it possible to include all kinds of services, such as voice, multimedia and information, on reachable platform through any Internet link. A multi-attribute stereo model for IMS security analysis based on ITU-T Recommendation X.805 and STRIDE threat model, which provide a comprehensive and systematic standpoint of IMS. Femtocell access points (H(e)NBs) are close-range, limited-capacity base stations that use residential broadband connections to connect to carrier networks. Final conclution to provide hop-by-hop message Authentication without the weakness of the built in threshold of the polynomial-based scheme, then proposed a hop-by-hop message authentication scheme based on the SAMA. Key words- Long-Term Evolution (LTE), Multi Hop, Worldwide Interoperable For Microwave Access (Wimax), Elliptic Curve Diffie Hellman (ECDH). 1. INTRODUCTION In 4G networks, Worldwide interoperable for Microwave Access (WiMAX) and Long-Term Evolution (LTE) are two emerging broadband wireless technologies aimed at providing high-speed Internet of 100 Mb/s at a vehicular speed of up to 350 km/h. Further, 4G wireless standards provide well-defined QoS and security architecture. For this reason, 4G cellular networks are considered up-and-coming technologies for vehicular multimedia applications. WiMAX and LTE resemble each other in some key aspects, including operating frequency spectrum, large capacity, mobility, strong QoS mechanisms, and strong security with a related key hierarchy from the core network to the access network. However, WiMAX and LTE also differ from each other in assured aspects, as they have evolved from different origins. LTE has evolved from 3rd Generation Partnership Projects (3GPP); therefore, the LTE network has to support the existing 3G users connectivity, but there is no such constraint for WiMAX. Particularly, on the security aspect, the WiMAX authentication process uses Extensive Authentication Protocol Tunneled Transport Layer Security (EAP-TTLS) or EAP- Transport Layer WiMAX is the emerging broadband wireless technologies based on IEEE standard. The security sublayer of the IEEE d standard defines the security mechanisms for fixed and IEEE e standard defines the security mechanisms for mobile network. The security sub layer supports are to: (i) authenticate the user when the user enters in to the network, (ii) authorize the client, if the user is provisioned by the network service provider, and then (iii) provide the necessary encryption support for the key transfer and data traffic. The previous IEEE d standard security architecture is based on PKMv1 (Privacy Key Management) protocol but it has many security issues. A large amount of these issues are resolved by the later version of PKMv2 protocol in IEEE e standard which provides a flexible solution that supports device and user authentication between a mobile station (MS) and the home connectivity service network (CSN). Even though both of these principles brief the medium access control (MAC) and physical (PHY) layer functionality,

2 261 they mainly concentrate on point-to multipoint (PMP) networks. In the concern of security, mesh networks are more vulnerable than the PMP network, but the principles have unsuccessful to concentrate on the mesh mode. Figure 1. WIMAX architecture The requirement for higher data speed is increasing rapidly, reason being the availability of smart phones, at low cost in the market due to competition and usage of social networking websites. Constant improvement in wireless data rate is already happening. Different network technologies are integrated to provide seamless connectivity and are termed as heterogeneous network. Long Term Evolution-Advanced (LTE-A) is known as 4G and it is the solution for heterogeneous networks and wireless broadband services. International Mobile Telecommunication-Advanced (IMT-Advanced) represents a family of mobile wireless technology, known as 4G. Basically IP was termed as a general-purpose data transport protocol in the network layer, but now extended as a carrier for voice and video communications over 4G networks. Wireless networks in the future will be heterogeneous. Different access networks such as Institute of Electrical and Electronics Engineers (IEEE) Wireless Personal Area Network (WPAN), IEEE Wireless Local Area Network (WLAN), IEEE Wireless Metropolitan Area Network (WMAN), General Packet Radio Service (GPRS), Enhanced Data rate for GSM Evolution (EDGE), Wideband Code Division Multiple Access (WCDMA), Code Division Multiple Access (CDMA2000), satellite network etc are integrated. Selecting the suitable access network to meet the QoS requirements of a specific application has become a significant topic and priority is to maximize the QoS experienced by the user. QoS is the ability of a network to provide premier service to some fraction of total network traffic over specific underlying technologies. QoS metrics are delay, jitter (delay variation), service availability, bandwidth, throughput, packet loss rate. Metrics are used to indicate performance of particular scheme employed. QoS can be achieved by resource reservation (integrated services), prioritization (differentiated services). From the QoS point of view, the protocol stack is composed of upper layer protocols (transport and above), on top of IP. Applications can, in this context, be classified according to the data flows they exchange as elastic or real-time. The network layer includes IP traffic control that implements datagram policing and classification, flow shaping, and scheduling. The data link layer may also provide QoS support, by means of transmission priorities or virtual channels. QoS provision in 4G networks is challenging as they support varying bit rates from multiple users and variety of applications, hostile channel characteristics, bandwidth allocation, fault-tolerance levels, and frequent handoff among heterogeneous wireless networks. QoS support can occur at the network, transport, application, user and switching level. To meet QoS, On the other hand, the LTE authentication procedure uses the EAP Authentication and Key Agreement (EAP- AKA) procedure that authenticates only the International Mobile Subscriber Identity (IMSI) burned in a subscriber identity module (SIM) card. Accordingly, the LTE security does not meet the enterprise security requirement, as LTE does not authenticate enterprise controlled security. Figure 2. LTE Architecture Moreover, there is a lack of an integrated study and QoS-aware solutions for multi hop WiMAX and LTE security threats in existing research efforts. Therefore, the third objective of this paper is then to analyze both

3 262 WiMAX and LTE for network convergence that may be useful or even crucial for service providers to support high-speed vehicular applications. To identified the DoS/Reply attack threat in the LTE network during the initial network entry stage of the user equipment (UE). As the WiMAX and LTE networks have similarities in security key hierarchy from the core network to the access network and symmetric key encryption, we further apply the design of ECDH to LTE networks. Device mutual authentication is performed using IKEv2 with public key signature based authentication with certificates Security is arguably one of the primary concerns and will determine the future of IMS deployment. Usually, IPSec will affect the QoS performance, because the IPSec header in each packet consumes additional bandwidth. To mitigate the security threats and performance degradation, propose a distributed security scheme using a protocol elliptic curve Diffie Hellman (ECDH) that has lower overhead than that of IPSec. ECDH is a Layer-2 key agreement protocol that allows users to establish a shared key over an insecure channel. ECDH was investigated, and the results showed that it did not affect the QoS performance much in 4G singlehop WiMAX networks. Therefore, ECDH is adopted in this research in dealing with the existing Layer-2 security threats for 4G multihop networks. This paper proposes a multi-attribute stereo model for IMS security analysis based on ITU-T Recommendation X.805 and STRIDE threat model, which provides a comprehensive and systematic perspective of IMS. A threat analysis of IMS network is made by adopting the model. Attack is avoided at H(e(NB by allowing only IKE negotiations and ESP-encrypted traffic using IKEv2. During setup of the tunnel, the H(e)NB includes a list of supported ESP authentication transforms and ESP encryption transforms as part of the IKEv2 signaling. The SeGW selects an ESP authentication transform and an ESP encryption transform and signal this to the H(e)NB. 2. RELATED WORKS In this paper [2] Muhammed Mustaqim, Khalid Khan, Muhammed Usman represent QoS support can occur at the network, transport, application, user and switching levels. To meet QoS, address the following issues like encryption protocols, security and trust of information, dissimilar rates, fault profiles, latencies, burstiness, dynamic optimization of scarce resources and fast handoff control. In this paper [3] M. Purkhiabani and A. Salahi proposed authentication and key agreement protocol for next generation Long term evolution/ System Architecture Evolution(LTE/SAE) networks and compared its enhancements with contrast to Universal Mobile Terrestrial System- Authentication and Key Agreement( UMTS-AKA), then, offers a new improvement protocol which increases performance of authentication procedure. In fact the new proposed protocol by sharing serving network with Home Subscription Server (HSS) for execution of authentication procedure and increasing a little computation in Mobility Management Entity(MME) and generated joined authentication vectors in both MME and HSS can remove aforementioned problems during authentication process. The proposed-aka with contrast to original-aka, the more MS and service request rate, the more considerable deduction of authentication load for HSS. In this paper [4] H-M. Sun, Y-H. Lin, and S-M.Chen, proposed Several fast authentication schemes have been proposed based on pre authentication concept in /WLAN networks. These schemes present different methods to enhance the efficiency and security of re-authentication process. By using the pre authentication notion, suggest a pre-authentication system for WiMAX infrastructures in this paper. Due to elasticity and refuge, the proposed scheme is joint with the PKI architecture. It provides a safe and fast reauthentication procedure during macro-handover in /WiMAX networks. In this paper [6] J. Donga, R. Curtmolab, and C. N. Rotarua proposed to identify two general frameworks (inter-flow and intra-flow) that encompass several network coding-based systems proposed in wireless networks. The systematic study of the mechanism of these frameworks reveals vulnerabilities to a wide variety of attacks, which may severely degrade system presentation. Then, recognize security goals and design challenges in achieving security for network coding systems. Adequate sympathetic of both the threats and challenges is essential to effectively design secure practical network coding systems. This paper should be viewed as a reproving note pointing out the frailty of current network coding-based wireless systems and a general guideline in the effort of achieving security for network coding systems. In this paper [9] Wang, F. Yang, Q. Zhang and Y. Xu proposed an analytical model for multi hop IEEE networks to calculate how a lot bandwidth can be utilized along a path without violating the QoS requirements of existing rate-controlled traffic flows. To analyze the path capacity, a notion of "Free channel time" is introduced. It is the time allowed for a wireless link to transmit data. The model characterizes the unsaturated traffic condition to attain goal. The node

4 263 depicts the interaction between the newly injected traffic and the hidden traffic which would have an effect upon the new traffic. 3. DESCRIPTION OF THE PROPOSED SCHEME WiMAX and LTE are Fourth-Generation (4G) wireless technologies that have well-defined quality of service (QoS) and security architectures. The numbers of users communicate to the Mobile Station through the Base Station. During the data transmission the attackers easily hack the data. To overcome this problem, in the proposed scheme, the wireless nodes are initially authenticated by the home network and then authorized by the access node. The proposed scheme requires only a slightly higher Bandwidth and computational overhead than the default standard scheme. The Proposed a distributed security architecture using the ECDH algorithm in Layer 2 for 4G multihop wireless networks. The proposed scheme provides strong security and hasty authentication for handover users without affecting the QoS performance. The proposed security schemes, measuring and analyzing both the security level and QoS performance is mandatory for 4G vehicular networks, as they intend to provide high QoS and security for their customers. To analyze the security and QoS performance of the proposed ECDH security for both WiMAX and LTE networks. The QoS performance metrics used in the experiments are subscriber stations (SSs) connectivity latency, throughput, frame loss, and latency. For the ECDH scheme, the handover latency is significantly reduced versus that of the default security scheme; thus, the ECDH scheme improves the QoS performance of the vehicular users. To establish hop-by-hop authentication and to reduce the computational overhead for the centralized node, distributed security architecture is necessary for multihop networks. Further, the centralized security mode introduces longer authorization and SA delay than that of the distributed mode, which affects the QoS performance in vehicular networks. In multihop LTE networks, the security architecture defined by the 3GPP standard is a distributed scheme. On the other hand, selection of the distributed security mode in WiMAX is optional, but data transfer using the tunnel mode is still an open issue. Hence, proposed the distributed security architecture using ECDH for multihop WiMAX networks. For multihop (nth hop) connectivity using ECDH, the cell-edge RS broadcasts its public key, ECDH global parameters, RS-ID, and system parameters in the DCD broadcast message. 3.1 Security Analysis There are three security schemes considered for this analysis: 1) default MAC-layer security defined by standards; 2) IPSec security on top of the MAC-layer security; and 3) the proposed ECDH protocol at the MAC layer with default security. First, we explain how the proposed ECDH protocol overcomes the existing security threats in each category for both WiMAX and LTE networks. Later, we compare the performance of these three security schemes in Table VIII, where we enhanced our previous analysis Analysis on ECDH Protocol against Security Threats in WiMAX Networks: 1) Ranging attacks: In our proposed security architecture, RNG_REQ and RNG_RSP messages are encrypted by the public key of the receiver. Hence, the intermediate rogue node has difficulty in processing the message in a short period, and the system is free from DoS/Replay and other attacks during initial ranging. 2) Power-saving attacks: Already, the IEEE m standard provides an option for encrypting the control messages in a power-saving mode. For IEEE standards, the network may use ECDH implementation to overcome the power-saving attacks. 3) Handover attacks: The MOB NBR-ADV attacks do not exist in the IEEE network because the BS can encrypt the message. For other networks, the messages are encrypted using ECDH to overcome those security threats. For latency issues during handover, two scenarios are considered: 1) RS mobility (e.g., RS is installed on top of a train, and WiMAX users are inside the train), and 2) MS mobility. For RS mobility in the proposed security architecture, reauthentication for RS is not necessary, because the BS or the target RS knows the list of RSs and the corresponding RS_ID in the network. Otherwise, if the target node is another BS, the serving BS can send the RS authentication information including AK in a secured manner, as defined in IEEE m. 4) Miscellaneous attacks: For downgrade attack, if the level of security is low in the MS basic capability request message, the BS should ignore the message. For bandwidth spoofing, the BS should allocate the bandwidth only based on the provisioning of the MS. These downgrade attack and bandwidth spoofing can be solved by using basic intelligence in the BS. 5) Multihop security threats: One of the major issues in a multihop wireless network is the introduction of rogue node in a multihop path. In our distributed security mode, once the joining node is authenticated by the home network (AAA server), mutual authentication takes place between the joining node and the access node (RS or BS). Hence, the new node identifies the rogue

5 264 node during the mutual authentication step, and no other credential information is shared. Thus, the proposed solution avoids the introduction of the rogue node problem. For tunnel mode security support, the communication between the BS and the access RS is encrypted using the ECDH public key of the receiver. Hence, the network supports tunnel mode operation using the ECDH tunnel. 6) Other security threats: Other security threats such as attacks against WiMAX security, multicast/broadcast attacks, and mesh mode attacks do not exist in IEEE m networks. Otherwise, if the network uses ECDH implementation, the control messages are encrypted. Hence, those security threats are avoided Analysis on ECDH Protocol against Security Threats in LTE Networks: 1) LTE system architecture security threats: Security threats such as injection, modification, eavesdropping attacks, HeNB physical intrusions, and rogue enb/rn attacks still exist with ECDH implementation. 2) LTE access procedure attacks: Similar to WiMAX networks, the intruder can introduce a DoS/Replay attack during the random-access process, as the messages are in plain text. In our proposed security architecture, the random-access Request message is encrypted by the public key of enb, and the response message is encrypted by the public key of UE. Hence, the messages exchanged during the random-access process are encrypted, and the DoS/Replay attack is avoided. For IMSI water torture attacks, we suggest EAP-based authentication that is similar to WiMAX, where the Attach Request message is encrypted by home network shared secrets. For disclosure of the user s identity privacy, the Attach Request message is encrypted by enb s public key in ECDH implementation. Hence, it is difficult for the attacker to decrypt the Attach Request message to know the IMSI. Thus, disclosure of the user s identity is avoided. 3) Handover attacks: Location tracking is possible by eavesdropping the CRNTI information in a handover command message. However, this attack is avoided with the proposed scheme, because the CRNTI information is now encrypted. Other security threats, lack of backward secrecy, and desynchronization attacks still exist in ECDH implementation. 4) Miscellaneous attacks: If the attacker eavesdrops the CRNTI information in the random-access response or the handover command message, they can send a fake bandwidth request or false buffer status to allocate bandwidth unnecessarily. Using ECDH, enb encrypts the random access response message using UE s public key. Hence, bandwidth-stealing attack is avoided. The lack of SQN synchronization is similar to the desynchronization attack and still exists in ECDH implementation. 3.2 Analysis on ECDH Protocol Against Pollution and Entropy Attacks in Multihop WiMAX/LTE Networks: Pollution and entropy attacks are the major security threats in multihop wireless networks, when network coding is used for data transmissions. Since packets are unencrypted, attackers may introduce the polluted or stale packets that lead to pollution and entropy attacks. In our approach, every RS authenticates the neighbor RSs and shares the digital signatures. Hence, the attackers have difficulty in introducing the pollution attack. For the entropy attack, the RS may introduce a time stamp field in the message header. Subsequently, the RS can verify the time stamp of a received packet with the older packets. If the time stamp is older, then the RS may drop the packet to avoid the entropy attacks. 4. EXPERIMENT AND RESULTS 4.1 Throughput performance The throughput performance of the system for both the default and the IPSec security schemes. Provisioning of uplink and downlink wireless link for both the SSs in the AAA server is varied from 0 to 20 Mb/s. Using an IXIA traffic generator, traffic is transmitted for the total provisioned wireless capacity, and the received traffic is also noted. From the results, it is clear that the throughput for the IPSec security scheme is less than that for the MAC-layer security scheme. Initially, when the wireless link capacity is small, corresponding payloads (1500-byte packet) in the traffic are small. Hence, the drop is negligible. 4.2 Frame loss performance The end-to-end frame loss performance with respect to the total link capacities of the two SSs. Initially, as the number of packets (payload) is small at low wireless link capacity, frame loss is small (< 40) until the input traffic reaches. The frame losses in the IPSec scheme increases as the link capacity increases. The frame loss increases almost linearly for the IPSec scheme between the input traffic 8 Mb/s and 12 Mb/s. The packet drop increases in both schemes when the input traffic exceeds the practical system capacity of 18.5 Mb/s. 4.3 Latency performance The delay experienced by the traffic in the IPSec security scheme steadily increases from 4 to 9 Mb/s. The delay for the IPSec scheme is much higher than that for the MAC security scheme when the wireless link

6 265 capacity reaches 10 Mb/s. After 10 Mb/s, the average delay experienced by the IPSec is more than double when compared with the default MAC security. PERFORMANCE COMPARISON Method Throughput Frame Latency loss Existing 74% 80% 92% system Proposed system 93% 45% 37% 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Existing System Proposed System For the ECDH scheme, the handover latency is significantly reduced versus that of the default security scheme; thus, the ECDH scheme improves the QoS performance of the vehicular users. Consequently, suggest the ECDH protocol for 4G multihop wireless networks, and it is suitable for vehicular networks, since the proposed security scheme aids in hasty authentication without compromising the QoS performance. 5. CONCLUSION This paper, therefore, presented an integrated view with emphasis on Layer-2 and Layer-3 technologies for WiMAX and LTE security, which is useful for the research community. In addition, the performance of the proposed and other security schemes is analyzed using simulation and testbed implementation. Existing work QoS-aware distributed security architecture using the elliptic curve Diffie Hellman (ECDH) protocol that has proven security strength and low overhead for 4G wireless networks.the proposed distributed security architecture using the ECDH key exchange protocol.ecdh can establish a shared secret over an insecure channel at the highest security strength.limitations of high computational and communication overhead in addition to lack of scalability.so that the proposed work propose an unconditionally secure and efficient SAMA. The main idea is that for each message m to be released, the message sender, or the sending node, generates a source anonymous message authenticator for the message m.the generation is based on the MES scheme on elliptic curves. For a ring signature, each ring member is required to compute a forgery signature for all other members in the AS. The QoS measurement using the testbed implementation and theoretical studies show that the IPSec scheme provides strong security for data, but not for the control messages. Consequently, suggest the ECDH protocol for 4G multihop wireless networks, and it is suitable for vehicular networks, since the proposed security scheme aids in hasty authentication without compromising the QoS performance Final conclution to provide hop-byhop message Authentication without the weakness of the built in threshold of the polynomial-based scheme, then proposed a hop-by-hop message authentication scheme based on the SAMA. REFERENCES [1] N. Seddigh, B. Nandy, and R. Makkar, Security advances and challenges in 4G wireless networks, in Proc. 8th Annu. Conf. Privacy, Security, Trust, 2010, pp [2] Muhammed Mustaqim, Khalid Khan, Muhammed Usman, LTEadvanced: Requirements and technical challenges for 4G cellular network, Journal of Emerging Trends in Computing and Information Sciences, vol.3, Issue.5, pp , May [3]M. Purkhiabani and A. Salahi, Enhanced authentication and key agreement procedure of next generation evolved mobile networks, in Proc. 3 rd Int. Conf. Commun. Softw. Netw., 2011, pp [4] H-M. Sun, Y-H. Lin, and S-M. Chen, Secure and fast handover scheme based on pre-authentication method for WiMAX, in Proc. IEEE Region 10 Conf., 2007, pp [5] T. Shon and W. Choi, An analysis of mobile WiMAX security: Vulnerabilities and solutions, in Lecture Notes in Computer Science, T. Enokido, L. Barolli, and M. Takizawa, Eds. Berlin, Germany: Springer-Verlag, 2007, pp [6] J. Donga, R. Curtmolab, and C. N. Rotarua, Secure network coding for wireless mesh networks threats challenges and directions, J. Comput. Commun., vol. 32, no. 17, pp , Nov [7] L. Yi, K. Miao, and A. Liu, A comparative study of WiMAX and LTE as the next generation mobile enterprise network, in Proc. 13th Int. Conf. Adv. Comm. Tech., 2011, pp

7 266 [8] H. Jin, L. Tu, G. Yang, and Y. Yang, An improved mutual authentication scheme in multi-hop WiMax network, in Proc. Int. Conf. Comput. Elect. Eng., 2008, pp [9] K. Wang, F. Yang, Q. Zhang and Y. Xu, "Modeling path capacity in multi-hop IEEE networks for QoS service," IEEE Transactions on Wireless Communications, Vol.6, No.2, pp , February [10] T. Han, N. Zhang, K. Liu, B. Tang, and Y. Liu, Analysis of mobile WiMAX security: Vulnerabilities and solutions, in Proc. 5th Int. Conf. Mobile Ad Hoc Sensor Syst., 2008, pp Karpagam received the B.E degree in Electronics and Communication Engineering from Anna University, India in She is currently pursuing M.E degree in Communication Systems, Anna University, India. Her research interests mainly include Networks. Nithya received the B.E degree in Electronics and Communication Engineering from Anna University, India and the M.E degree in Communication Systems, Anna University, India. She is currently working as an assistant professor in the department of ECE, Dhanalakshmi Srinivasan Engineering College, Perambalur. Her research interests mainly include Networks.

International Conference on Engineering Trends and Science & Humanities (ICETSH-2015)

International Conference on Engineering Trends and Science & Humanities (ICETSH-2015) ENHANCE THE SECURITY AND AUTHORIZATION FOR DATA TRANSMISSION IN WIRELESS NETWORKS N.Karpagam 1, S.Nithya 2 II-M.E(CS) 1, Assistant Professor / ECE 2, Dhanalakshmi Srinivasan Engineering College, Perambalur.

More information

A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture

A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless Network using QOS-Aware Distributed Architecture Miss. Shraddha V. Pawar 1, Prof. Sachin P. Patil 2 1Department of Computer Science

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Survey of security features in LTE Handover Technology

Survey of security features in LTE Handover Technology Scientific Research Journal (SCIRJ), Volume III, Issue VIII, August 2015 27 Survey of security features in LTE Handover Technology Md Mehedi Masud Department of Computer Science and Technology University

More information

Protection Schemes for 4G Multihop wireless Networks

Protection Schemes for 4G Multihop wireless Networks Protection Schemes for 4G Multihop wireless Networks Sridevi, Assistant Professor, Department of Computer Science, Karnatak University, Dharwad Abstract:-This paper describes the relay node protection

More information

1.1 Beyond 3G systems

1.1 Beyond 3G systems 1 Introduction The cellular wireless communications industry witnessed tremendous growth in the past decade with over four billion wireless subscribers worldwide. The first generation (1G) analog cellular

More information

WiMAX Security: Problems & Solutions

WiMAX Security: Problems & Solutions (JCSCR) - ISSN 2227-328X WiMAX Security: Problems & Solutions Paul Semaan LACSC Lebanese Association for Computational Sciences Registered under No. 957, 2011, Beirut, Lebanon Abstract This paper is a

More information

INTRODUCTION TO LTE. ECE MOBILE COMMUNICATION Monday, 25 June 2018

INTRODUCTION TO LTE. ECE MOBILE COMMUNICATION Monday, 25 June 2018 INTRODUCTION TO LTE ECE 2526 - MOBILE COMMUNICATION Monday, 25 June 2018 1 WHAT IS LTE? 1. LTE stands for Long Term Evolution and it was started as a project in 2004 by the Third Generation Partnership

More information

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS

OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS Kamini Jaswal 1, Jyoti 2, Kuldeep Vats 3 1 M.tech, Department of electronics and communication, South point institute of engineering

More information

SECURITY ISSUES OF WIMAX

SECURITY ISSUES OF WIMAX SECURITY ISSUES OF WIMAX 1 3 V Venkata Santosh 1, Balajee Maram 2, V KUMAR 3 B.Tech student, CSE Dept., GMR Institute of Technology, Rajam, AP. venkatasantosh.vummididev@gmail.com 2 Asst. Prof., Dept of

More information

INTERNATIONAL JOURNAL OF BASIC AND APPLIED SCIENCE. Analyzing Issues in Mobile Wimax Handover Using Qualnet Simulator

INTERNATIONAL JOURNAL OF BASIC AND APPLIED SCIENCE. Analyzing Issues in Mobile Wimax Handover Using Qualnet Simulator Insan Akademika Publications INTERNATIONAL JOURNAL OF BASIC AND APPLIED SCIENCE www.insikapub.com P-ISSN: 2301-4458 E-ISSN: 2301-8038 Vol. 01, No. 02 Oct 2012 Analyzing Issues in Mobile Wimax Handover

More information

Experimental Analysis of the Femtocell Location Verification Techniques

Experimental Analysis of the Femtocell Location Verification Techniques Experimental Analysis of the Femtocell Location Verification Techniques Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert Security in Telecommunication Technical University Berlin and Deutsche

More information

A Review on Soft Handover Schemes in LTE Cellular Networks

A Review on Soft Handover Schemes in LTE Cellular Networks http:// A Review on Soft Handover Schemes in LTE Cellular Networks Shreedhar K V M Department of Computer Science and Engineering R V College of Engineering Bengaluru, India - 560095 Abstract - Long Term

More information

Seamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism

Seamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism Seamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism Bharatesh Chakravarthi S. B M.Tech. Dept of ISE The Oxford College of Engineering Bangalore, India Prof. D. Jayaramaiah

More information

IPv6-based Beyond-3G Networking

IPv6-based Beyond-3G Networking IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless

More information

Communication and Distributed Systems Seminar on : LTE Security. By Anukriti Shrimal May 09, 2016

Communication and Distributed Systems Seminar on : LTE Security. By Anukriti Shrimal May 09, 2016 Communication and Distributed Systems Seminar on : LTE Security By Anukriti Shrimal May 09, 2016 LTE network with interfaces LTE Security 2 Contents LTE Security : Why, What, How EPS Architecture Design

More information

Cisco ASR 5000 Series Small Cell Gateway

Cisco ASR 5000 Series Small Cell Gateway Data Sheet Cisco ASR 5000 Series Small Cell Gateway Mobile subscribers want access to the network at home, work, hotspots, and everywhere in between. This requires mobile operators to expand their service

More information

Mobile WiMAX Security

Mobile WiMAX Security WHITE PAPER WHITE PAPER Makes Mobile WiMAX Simple Mobile WiMAX Security Glossary 3 Abstract 5 Introduction to Security in Wireless Networks 6 Data Link Layer Security 8 Authentication 8 Security Association

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

LTE Security How Good Is It?

LTE Security How Good Is It? SESSION ID: TECH-RO3 LTE Security How Good Is It? Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology @jchonski Joshua Franklin IT Specialist (Security) National Institute

More information

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS

OPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.862

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

3GPP security. Valtteri Niemi 3GPP SA3 (Security) chairman Nokia

3GPP security. Valtteri Niemi 3GPP SA3 (Security) chairman Nokia 3GPP security Valtteri Niemi 3GPP SA3 (Security) chairman Nokia 1 Some history and background 2 Some history 1/2 SA3 took over the responsibility of specifications created by ETSI SMG10, e.g. TS 43.020

More information

Mobile WiMAX EPL 657. Panayiotis Kolios

Mobile WiMAX EPL 657. Panayiotis Kolios Mobile WiMAX EPL 657 Panayiotis Kolios 1 WiMAX Based on the 802.16 suite of protocols Air interface OFDMA defined under 802.16-2004 Mobility enhancements made under 802.16e include multi-path performance

More information

Survey on Security Architecture for 4G Wireless Networks R. Sugitha 1, M. Leeban Moses 2

Survey on Security Architecture for 4G Wireless Networks R. Sugitha 1, M. Leeban Moses 2 Survey on Security Architecture for 4G Wireless Networks R. Sugitha 1, M. Leeban Moses 2 1 PG Scholar, Department of ECE, Coimbatore Institute of Engineering and Technology, Coimbatore, India 2 Department

More information

Security Considerations for Handover Schemes in Mobile WiMAX Networks

Security Considerations for Handover Schemes in Mobile WiMAX Networks Security Considerations for Handover Schemes in Mobile WiMAX Networks Junbeom Hur, Hyeongseop Shim, Pyung Kim, Hyunsoo Yoon, Nah-Oak Song Division of Computer Science, Mobile Media Platform Center, Korea

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1 IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. IV (May - Jun. 2014), PP 49-53 Analyzing the performance of WiMAX zone

More information

Improved One-Pass IP Multimedia Subsystem Authentication for UMTS

Improved One-Pass IP Multimedia Subsystem Authentication for UMTS Improved One-Pass IP Multimedia Subsystem Authentication for UMTS Lili Gu RMIT University Melbourne, Australia l.gu@student.rmit.edu.au Abstract As defined in the 3GPP specifications, a UMTS user device

More information

Security Management in Mobile Node Wimax Without Degrading the Quality of Service (QOS)

Security Management in Mobile Node Wimax Without Degrading the Quality of Service (QOS) European Journal of Applied Sciences 7 (2): 86-91, 2015 ISSN 2079-2077 IDOSI Publications, 2015 DOI: 10.5829/idosi.ejas.2015.7.2.22154 Security Management in Mobile Node Wimax Without Degrading the Quality

More information

Preface Preliminaries. Introduction to VoIP Networks. Public Switched Telephone Network (PSTN) Switching Routing Connection hierarchy Telephone

Preface Preliminaries. Introduction to VoIP Networks. Public Switched Telephone Network (PSTN) Switching Routing Connection hierarchy Telephone VoIP quality and performance issues Delay Jitter Packet loss Echo and talk overlap Approaches to maintaining VoIP quality Network-level QoS VoIP codecs VoIP applications and services Fax Emergency numbers

More information

Mobility Management in Heterogeneous Mobile Communication Networks through an Always Best Connected Integrated Architecture

Mobility Management in Heterogeneous Mobile Communication Networks through an Always Best Connected Integrated Architecture Mobility Management in Heterogeneous Mobile Communication Networks through an Always Best Connected Integrated Architecture Dionysia Triantafyllopoulou *, National and Kapodistrian University of Athens

More information

7/27/2010 LTE-WIMAX BLOG HARISHVADADA.WORDPRESS.COM. QOS over 4G networks Harish Vadada

7/27/2010 LTE-WIMAX BLOG HARISHVADADA.WORDPRESS.COM. QOS over 4G networks Harish Vadada 7/27/2010 HARISHVADADA.WORDPRESS.COM LTE-WIMAX BLOG QOS over 4G networks Harish Vadada Cellular network operators across the world have seen an explosive growth of mobile broadband usage. Traffic volume

More information

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,

More information

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA in Third-Generation Systems

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA in Third-Generation Systems 1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA in Third-Generation Systems Analog cellular systems are commonly referred to as first-generation systems. The digital systems, such as Global System

More information

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH, Abstract In the future of Mobile networks it is important to implement a Femtocell at homes and to improve the domestic network. Even

More information

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision Huei-Wen Ferng, Jin-Hui Lin, Yuan-Cheng Lai, and Yung-Ching Chen Department of Computer Science and Information

More information

IP Core Expertise From WireIE

IP Core Expertise From WireIE Leveraging the IP Network Core to Enrich Broadband Access Growth in the adoption of broadband network access is expected to continue on a worldwide basis for the next several years. Whether its wireline

More information

Wireless Networking: An Introduction. Hongwei Zhang

Wireless Networking: An Introduction. Hongwei Zhang Wireless Networking: An Introduction Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Networking as resource allocation A taxonomy of current practice Technical elements Outline Networking as resource

More information

Header Compression Capacity Calculations for Wireless Networks

Header Compression Capacity Calculations for Wireless Networks Header Compression Capacity Calculations for Wireless Networks Abstract Deployment of wireless transport in a data-centric world calls for a fresh network planning approach, requiring a balance between

More information

A Glimpse at the Wireless Data Communications Standards. Fanny Mlinarsky 8 August 2007

A Glimpse at the Wireless Data Communications Standards. Fanny Mlinarsky 8 August 2007 A Glimpse at the Wireless Data Communications Standards Fanny Mlinarsky 8 August 2007 IMS Infrastructure for FMC IP Multimedia Subsystem (IMS) IP Network Fixed Mobile Convergence Mobile Fixed www.octoscope.com

More information

Dynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks

Dynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks Dynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks Ping-Chen Lin and Ray-Guang Cheng Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology,

More information

UNIT 1 Questions & Solutions

UNIT 1 Questions & Solutions UNIT 1 Questions & Solutions 1. Give any 5 differences between cellular wireless networks and ADHOC wireless network. Ans: The following table shows the difference between cellular networks and Adhoc wireless

More information

Satellite-Based Cellular Backhaul in the Era of LTE

Satellite-Based Cellular Backhaul in the Era of LTE Satellite-Based Cellular Backhaul in the Era of LTE Introduction 3 Essential Technologies for 3G/LTE Backhauling over Satellite 6 Gilat s Solution SkyEdge II-c Capricorn 7 Why Ultra-fast TDMA is the Only

More information

ANALYSIS OF LTE VS. WIMAX

ANALYSIS OF LTE VS. WIMAX ANALYSIS OF LTE VS. WIMAX ENSC 427, SPRING 2013, TEAM #08 NG Jackie, 301056206 (jna10@sfu.ca) ZHU Wangyi (Nick), 301159678 (wangyiz@sfu.ca) RAJARATANAM Sutharsan, 200081017 (srajara1@sfu.ca) OVERVIEW INTRODUCTION

More information

Key Performance Aspects of an LTE FDD based Smart Grid Communications Network

Key Performance Aspects of an LTE FDD based Smart Grid Communications Network Key Performance Aspects of an LTE FDD based Smart Grid Communications Network Presented by: Ran Zhang Supervisors: Prof. Sherman(Xuemin) Shen, Prof. Liang-liang Xie Main Reference Jason Brown, and Jamil

More information

IMT-2020 NETWORK HIGH LEVEL REQUIREMENTS, HOW AFRICAN COUNTRIES CAN COPE

IMT-2020 NETWORK HIGH LEVEL REQUIREMENTS, HOW AFRICAN COUNTRIES CAN COPE IMT-2020 NETWORK HIGH LEVEL REQUIREMENTS, HOW AFRICAN COUNTRIES CAN COPE Draft ITU-T Rec. Y.IMT2020-reqts Brice MURARA, ITU-T SG 13 Vice-chairman Agenda Background IMT Systems evolution towards 5G IMT-2020

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

Overview of Mobile Networking Initiatives at WINLAB

Overview of Mobile Networking Initiatives at WINLAB Overview of Mobile Networking Initiatives at WINLAB Introduction: The Next Generation MSC Custom Mobile Infrastructure (e.g. GSM, 3G) BTS Public Switched Network (PSTN) BSC GGSN, etc. WLAN Access Point

More information

Mobile Network Evolution Part 2

Mobile Network Evolution Part 2 Mobile Network Evolution Part 2 From UMTS to LTE or How to Further Increase Network Capacity and QoS Andreas Mitschele-Thiel Advanced Mobile Communication Networks 1 Outline Evolution from Circuit Switching

More information

DAY 2. HSPA Systems Architecture and Protocols

DAY 2. HSPA Systems Architecture and Protocols DAY 2 HSPA Systems Architecture and Protocols 1 LTE Basic Reference Model UE: User Equipment S-GW: Serving Gateway P-GW: PDN Gateway MME : Mobility Management Entity enb: evolved Node B HSS: Home Subscriber

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

MAC Overview NCHU CSE WMAN - 1

MAC Overview NCHU CSE WMAN - 1 MAC Overview NCHU CSE WMAN - 1 MAC Overview Connection-oriented Supports difficult user environments High bandwidth, hundreds of users per channel For variable Continuous and Burst traffic Very efficient

More information

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology Cellular Systems - II Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication UMTS Architecture A UMTS network consist

More information

Big Picture. ~10 years between generations

Big Picture. ~10 years between generations Big Picture ~10 years between generations 7 Who is Who? Mobile Operators ITU Members ITU GSM, W-CDMA, UMTS IS-95), IS-41, IS- 2000, IS-835 Third Generation Patnership Project (3GPP) CWTS (China) Third

More information

Vertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET

Vertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET Vertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET Abhishek Dhiman M.E, E.C.E Department, Thapar University, Patiala Karamjit Singh Sandha Asst. Professor, E.C.E Department

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

Security Advances and Challenges in 4G Wireless Networks

Security Advances and Challenges in 4G Wireless Networks 2010 Eighth Annual International Conference on Privacy, Security and Trust Security Advances and Challenges in 4G Wireless Networks N. Seddigh, B. Nandy, R. Makkar J.F. Beaumont Solana Networks Defence

More information

A Review of 3G-WLAN Interworking

A Review of 3G-WLAN Interworking A Review of 3G-WLAN Interworking B.Bindusha Reddy #, Dr Syed Umar *, M.Satya Anusha & *Assistant. Professor, Department of ECM, KL University, A.P., INDIA. #, & Student, Department of ECM, KL University,

More information

Implementation of Enhanced AKA in LTE Network

Implementation of Enhanced AKA in LTE Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1124

More information

2. SA1 Release 11 Standardization Trends

2. SA1 Release 11 Standardization Trends 3GPP SA1 Release 11 Standardization Trends 3GPP SA1 Service Requirements Release 11 3GPP SA1 Release 11 Standardization Trends NTT DOCOMO Technical Journal At the 3GPP, which standardizes mobile communications

More information

QOS ANALYSIS OF 3G AND 4G. Khartoum, Sudan 2 unversity of science and Technology, Khartoum, Sudan

QOS ANALYSIS OF 3G AND 4G. Khartoum, Sudan 2 unversity of science and Technology, Khartoum, Sudan QOS ANALYSIS OF 3G AND 4G Doaa Hashim Osman 1, Amin Babiker 2 and Khalid hammed Bellal 1 Department of Communication, Faculty of Engineering, AL Neelain University, Khartoum, Sudan 2 unversity of science

More information

Speed Effect on the Performance of Vertical Handover in Wifi-3G Network

Speed Effect on the Performance of Vertical Handover in Wifi-3G Network Speed Effect on the Performance of Vertical Handover in Wifi-3G Network Hassan Khalil Arab American University of Jenin Ramallah, Palestine Emails: Hassan.khalil22@gmail.com Mohammad Hamarsheh Arab American

More information

Introduction to Mobile Broadband (imb)

Introduction to Mobile Broadband (imb) Introduction to Mobile Broadband (imb) Teaching By Asst.Prof.Dr. Suwat Pattaramalai suwat.pat@kmutt.ac.th Tel. 02-470-9079 Material: http://webstaff.kmutt.ac.th/~suwat.pat/ 3GPP WiMAX FORUM Introduction

More information

Preface List of Acronyms

Preface List of Acronyms Contents Preface List of Acronyms xxi Chapter 1 Next Generation Wireless Technologies 1 1.1 Introduction 1 1.2 Wireless Networking Standardization Process 5 1.2.1 Wireless Personal Area Networks 5 1.2.2

More information

AL-FEC for Streaming Services over LTE Systems

AL-FEC for Streaming Services over LTE Systems AL-FEC for Streaming Services over LTE Systems Christos Bouras 1,2, Nikolaos Kanakis 2, Vasileios Kokkinos 1,2, Andreas Papazois 1,2 1 Computer Technology Institute and Press Diophantus, Patras, Greece

More information

CHAPTER 3 4G NETWORK ARCHITECTURE

CHAPTER 3 4G NETWORK ARCHITECTURE 62 CHAPTER 3 4G NETWORK ARCHITECTURE Wireless mobile communication system generations are all the time, a big topic for the research. Cellular service providers are already in the last phase of the deployment

More information

PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS

PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS by Alessandro Andreadis Giovanni Giambene KLUWER ACADEMIC PUBLISHERS NEW YORK, BOSTON, DORDRECHT, LONDON,

More information

Performance in Wimax Networks Using Vertical Handoff

Performance in Wimax Networks Using Vertical Handoff Performance in Wimax Networks Using Vertical Handoff Renu 1, Anil Dudy 2 Electronics and communication 1, 2,Shri Baba Mastnath Engg. college 1, 2 Email:renudalal89@gmail.com 2, anildudy10@gmail.com 2 Abstract-

More information

Defeating IMSI Catchers. Fabian van den Broek et al. CCS 2015

Defeating IMSI Catchers. Fabian van den Broek et al. CCS 2015 Defeating IMSI Catchers Fabian van den Broek et al. CCS 2015 Ren-Jay Wang CS598 - COMPUTER SECURITY IN THE PHYSICAL ckground 3GPP 3GPP 3 rd Generation Partnership Project Encompasses: GSM and related 2G

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

CEN 538 Wireless LAN & MAN Networks

CEN 538 Wireless LAN & MAN Networks King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book

More information

IEEE s ESS Mesh Networking

IEEE s ESS Mesh Networking IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE

More information

WiMax-based Handovers in Next Generation Networks

WiMax-based Handovers in Next Generation Networks WiMax-based Handovers in Next Generation Networks Nadine Akkari Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University, Saudi Arabia nakkari@kau.edu.sa

More information

Basic SAE Management Technology for Realizing All-IP Network

Basic SAE Management Technology for Realizing All-IP Network LTE SAE EPC Special Articles on SAE Standardization Technology Basic SAE Management Technology for Realizing All-IP Network The standardization of 3GPP Release 8 brings new provisions for All-IP networks

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

A Case Study on Security Issues in LTE Backhaul and Core Networks

A Case Study on Security Issues in LTE Backhaul and Core Networks Chapter 9 A Case Study on Security Issues in LTE Backhaul and Core Networks Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov Contents 9.1 Introduction...170 9.2 Evolution of Cellular Networks...171

More information

Part V. Appendices. Service M odelling: Principles and Applications Vilho Räisänen 2006 John Wiley & Sons, Ltd ISBN:

Part V. Appendices. Service M odelling: Principles and Applications Vilho Räisänen 2006 John Wiley & Sons, Ltd ISBN: Part V Appendices Service M odelling: Principles and Applications Vilho Räisänen 2006 John Wiley & Sons, Ltd ISBN: 0-470-01807-0 A 3GPP Bearer Concepts In the following text, we shall review 3GPP (Third

More information

A Study on Systems Beyond IMT-2000 in Korea

A Study on Systems Beyond IMT-2000 in Korea A Study on Systems Beyond IMT-2000 in Korea May 28, 2002 Vice President Ki-Chul Han, Ph.D (kchan kchan@etri.re. @etri.re.kr kr) Mobile Telecommunication Research Laboratory Electronics and Telecommunciations

More information

A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS

A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS Shalu Chauhan 1, Ankit Tripathi 2, Vartika Anand 3 1 Department of CSE,SRM University, Modinagar, India 2 Department of ECE, RKGIT, Ghaziabad,

More information

Challenges of Global Roaming

Challenges of Global Roaming Challenges of Global Roaming Syed S. Husain WP1/SSG Chair Motorola, USA Systems Rio de Janeiro, Brazil 1 Outline Global roaming - Definition & Requirements Technical Areas of Concern Ongoing Standards

More information

WiMAX and WiFi Interoperability in Next Generation Networks

WiMAX and WiFi Interoperability in Next Generation Networks WiMAX and WiFi Interoperability in Next Generation Networks Pedro Neves Crossnet Workshop Lisbon, February 19 th 2008 Portugal Telecom Inovação, S.A. Contents WiMAX & WiFi Overview Synergies Deployment

More information

Performance of Soft Handover FBSS Compared to Hard Handover in case of High Speed in IEEE e for Multimedia Traffic

Performance of Soft Handover FBSS Compared to Hard Handover in case of High Speed in IEEE e for Multimedia Traffic SETIT 2009 5 th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 22-26, 2009 TUNISIA Performance of Soft Handover FBSS Compared to Hard Handover

More information

3GPP security hot topics: LTE/SAE and Home (e)nb

3GPP security hot topics: LTE/SAE and Home (e)nb 3GPP security hot topics: LTE/SAE and Home (e)nb Valtteri Niemi 3GPP SA3 (Security) chairman Nokia Research Center, Lausanne, Switzerland Marc Blommaert 3GPP LTE/SAE security rapporteur Devoteam Telecom

More information

DESIGN AND ANALYSIS OF ENHANCED DEVELOPMENTS IN WIRELESS MOBILE NETWORKS AND SECURITY

DESIGN AND ANALYSIS OF ENHANCED DEVELOPMENTS IN WIRELESS MOBILE NETWORKS AND SECURITY International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN 2250 1568 Vol.2, Issue 2 June 2012 21-31 TJPRC Pvt. Ltd., DESIGN AND ANALYSIS OF ENHANCED DEVELOPMENTS IN

More information

Evaluation of M2M Data Traffic Aggregation in LTE-A Uplink

Evaluation of M2M Data Traffic Aggregation in LTE-A Uplink Evaluation of M2M Data Traffic Aggregation in LTE-A Uplink 1 Yasir Mehmood 2 Safdar Nawaz Khan Marwat 3 Dr. Yasir Zaki 1 Prof. Dr. Carmelita Görg 4 Prof. Dr. Andreas Timm-Giel 1 Communication Networks,

More information

Wi-Fi Security for Next Generation Connectivity. Perry Correll Aerohive, Wi-Fi Alliance member October 2018

Wi-Fi Security for Next Generation Connectivity. Perry Correll Aerohive, Wi-Fi Alliance member October 2018 Perry Correll Aerohive, Wi-Fi Alliance member October 2018 1 Value of Wi-F1 The value Wi-Fi provides to the global economy rivals the combined market value of Apple Inc. and Amazon. The fact that Wi-Fi

More information

Requirements for the Operations & Management of 4G Networks

Requirements for the Operations & Management of 4G Networks Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering

More information

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India

4G Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Technology in contrast with other G Technologies Raja Solanki,Vineeet Godara, Prashant Solanki, Dhronacharya Engineering College,Gurgaon,India Abstract-Wireless services have the highest demand in internet

More information

wireless networks and mobile computing (COMMON TO CSE AND CS) CONTENTS Classification of Wireless Networks

wireless networks and mobile computing (COMMON TO CSE AND CS) CONTENTS Classification of Wireless Networks i wireless networks and mobile computing FOR m.tech (jntu - hyderabad) i year Ii semester (COMMON TO CSE AND CS) CONTENTS UNIT - I [CH. H. - 1] ] [WIRELESS NETWORKS]... 1.1-1.24 1.1 WIRELESS NETWORK...

More information

DESIGN AND IMPLEMENTATION OF IEEE MAC LAYER SIMULATOR

DESIGN AND IMPLEMENTATION OF IEEE MAC LAYER SIMULATOR DESIGN AND IMPLEMENTATION OF IEEE 802.16 MAC LAYER SIMULATOR H. M. Shamitha 1, H. M. Guruprasad 1, Kishore. M 2, Ramesh. K 3 Department of Electronics and Communication 1 Proudadhevaraya Institute of Technology,

More information

4G LTE Technologies: System Concepts

4G LTE Technologies: System Concepts 4G LTE Technologies: System Concepts CK Toh, PhD, Chief Technology Advisor, ALICO Systems Inc., Torrance, CA, US ABSTRACT Recently, we have witnessed the roll out of LTE (Long Term Evolution, or so called

More information

Standardization Trend for Super 3G (LTE)

Standardization Trend for Super 3G (LTE) : NGN Mobile Communication Technologies for Standardization Trend for Super (LTE) Sadayuki Abeta and Minami Ishii Abstract Super (also known as Long Term Evolution (LTE)) expands upon the HSDPA/HSUPA (high-speed

More information

A Secure and Service-Oriented Network Control Framework for WiMAX Networks

A Secure and Service-Oriented Network Control Framework for WiMAX Networks WIRELESS BROADBAND ACCESS: WIMAX AND BEYOND A Secure and Service-Oriented Network Control Framework for WiMAX Networks Kejie Lu and Yi Qian, University of Puerto Rico Hsiao-Hwa Chen, National Sun Yat-Sen

More information

IEEE WiMax Security

IEEE WiMax Security IEEE 80.6 WiMax Security Dr. Kitti Wongthavarawat Thai Computer Emergency Response Team (ThaiCERT) National Electronics and Computer Technology Center Thailand Presented at 7 th Annual FIRST Conference,

More information

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network

On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE based WiMAX Network On Performance Evaluation of Different QoS Mechanisms and AMC scheme for an IEEE 802.16 based WiMAX Network Vinit Grewal Department of Electronics and Communication Engineering National Institute of Technology

More information