| Peer-Reviewed

Delay Sensitive Protocol for High Availability LTE Handovers

Received: 30 December 2019     Accepted: 13 January 2020     Published: 1 April 2020
Views:       Downloads:
Abstract

Long delays during the handover process lead to dropped calls which deteriorate the network quality of service. In addition, these delays impede the incorporation of authentication during the handover process which exposes the handover process to attacks such as desynchronization, network masquerading and session hijacking. In this paper, a delay sensitive protocol is developed based on the neuro-fuzzy optimization process and tracking area partitioning into no handover region, low probability handover region and high probability handover region that facilitated advance buffering of the figures of merit. The protocol computes the average delays during the handover process such that handovers taking longer durations than the average value are queued in the mobility management entity (MME) buffer and dispatched in a first in first out (FIFO) basis. The conventional permitted duration between handover command and handover execution is between 0.5 seconds and 1.5 seconds. To prevent holding the network resources for long durations, a handover termination duration was set to the lower bound of this conventional permitted duration, which was 0.5 seconds, such that handovers taking longer this duration were explicitly dropped. The reduced delays during the handover process facilitated the incorporation of entities authentication before subscribers can be transferred to the target cell. Simulation results showed the developed protocol greatly reduced handover delays to an average of 0.048 seconds. In addition, the source evolved Node-B (eNB), user equipment (UE) and target eNB were able to authenticate each other to boost security during the handover process.

Published in American Journal of Networks and Communications (Volume 9, Issue 1)
DOI 10.11648/j.ajnc.202009012.11
Page(s) 1-10
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2020. Published by Science Publishing Group

Keywords

Delay Sensitivity, Neuro-fuzzy, Low Latency, Handovers, LTE, Delay Sensitivity

References
[1] Basaras P., Belikaidis I., Maglaras L., and Katsaros D. (2016). Blocking epidemic propagation in vehicular networks, in Wireless On-demand Network Systems and Services (WONS), 12th Annual Conference on. IEEE, pp. 1–8.
[2] Babiker A., H. Ahmmed H., & Ali S.(2016). Comparative Study 1st, 2nd, 3rd, 4th, Generations from Handoff Aspects. International Journal of Science and Research, Vol. 5, Issue 6, pp. 934-941.
[3] Kastell K., Meyer U.,& R. Jakoby R. (2013). Secure Handover Procedures. Department of Computer Science, Darmstadt University of Technology, pp. 1-5.
[4] Osahenvemwen O., & F. Odiase F. (2016). Effective management of handover process in mobile communication network. Journal of Advances in Technology and Engineering Studies, Vol. 2, Issue 6, pp. 176-182.
[5] Zhang L., and Pierre S. (2014). An enhanced fast handover with seamless mobility support for next-generation wireless networks, Journal of Network and Comput. Applications, Vol. 46, pp. 322 – 335.
[6] Sridevi B., and Mohan D. (2015). Security analysis of Handover Key Management among 4G LTE entities Using Device Certification, International Journal of Electrical, Computing Engineering and Communication, Vol. 1, No 2, pp. 1-7.
[7] Lin Y., Longjhuang W., & Chen Yang C. (2015). Enhanced 4G LTE Authentication and Handover Mechanism. International Journal of Electrical, Electronics and Data Communication, Vol. 3, Issue 9, pp. 45-47.
[8] Han C., and Choi H.(2014). Security analysis of handover key management in 4G LTE/SAE networks, IEEE Trans. Mobile Comput., Vol. 13, No. 2, pp. 457- 468.
[9] Tayade P., and Vijaykumar P. (2017). A Comprehensive Contemplate on Security Aspects of LTE and LTE Advanced in Wireless Communication Network, International Journal of Control Theory and Applications, Vol. 10, No 31, pp. 197-217.
[10] Agarwal P., Thomas D., and Kumar A. (2017). Security Analysis of LTE/SAE Networks under De-synchronization Attack for Hyper-Erlang Distributed Residence Time, IEEE Communications Letters, Vol 21, No 5, pp. 1055-1058.
[11] Cao J., Ma M., Li H., Zhang Y., and Luo Z. (2014). A survey on security aspects for LTE and LTE-A networks, IEEE Commun. Surveys TUTs., Vol. 16, no. 1, pp. 283–302.
[12] Lai Y., Cheng P., Lee C., & CKu C. (2016). A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network. Department of Photonics and Communication Engineering, Asia University, Taichung, Taiwan, pp. 1-18.
[13] Copet P., Marchetto G., Sisto R., & Costa L. (2015). Formal Verification of LTE-UMTS Handover Procedures. IEEE, pp. 1-8.
[14] Degefa F., Lee D., Kim J., Choi Y., and Won D. (2016). Performance and security enhanced authentication and key agreement protocol for SAE/LTE network, Computer Networks, Vol 94, pp. 145-163.
[15] Nashwan S., and Alshammari B. (2017). Formal Analysis of MCAP protocol Against replay Attack, British Journal of Mathematics & Computer Science, Vol 22, No 1, pp. 1-14.
Cite This Article
  • APA Style

    Vincent Omollo Nyangaresi, Silvance Onyango Abeka, Anthony Joachim Rodrigues. (2020). Delay Sensitive Protocol for High Availability LTE Handovers. American Journal of Networks and Communications, 9(1), 1-10. https://doi.org/10.11648/j.ajnc.202009012.11

    Copy | Download

    ACS Style

    Vincent Omollo Nyangaresi; Silvance Onyango Abeka; Anthony Joachim Rodrigues. Delay Sensitive Protocol for High Availability LTE Handovers. Am. J. Netw. Commun. 2020, 9(1), 1-10. doi: 10.11648/j.ajnc.202009012.11

    Copy | Download

    AMA Style

    Vincent Omollo Nyangaresi, Silvance Onyango Abeka, Anthony Joachim Rodrigues. Delay Sensitive Protocol for High Availability LTE Handovers. Am J Netw Commun. 2020;9(1):1-10. doi: 10.11648/j.ajnc.202009012.11

    Copy | Download

  • @article{10.11648/j.ajnc.202009012.11,
      author = {Vincent Omollo Nyangaresi and Silvance Onyango Abeka and Anthony Joachim Rodrigues},
      title = {Delay Sensitive Protocol for High Availability LTE Handovers},
      journal = {American Journal of Networks and Communications},
      volume = {9},
      number = {1},
      pages = {1-10},
      doi = {10.11648/j.ajnc.202009012.11},
      url = {https://doi.org/10.11648/j.ajnc.202009012.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.202009012.11},
      abstract = {Long delays during the handover process lead to dropped calls which deteriorate the network quality of service. In addition, these delays impede the incorporation of authentication during the handover process which exposes the handover process to attacks such as desynchronization, network masquerading and session hijacking. In this paper, a delay sensitive protocol is developed based on the neuro-fuzzy optimization process and tracking area partitioning into no handover region, low probability handover region and high probability handover region that facilitated advance buffering of the figures of merit. The protocol computes the average delays during the handover process such that handovers taking longer durations than the average value are queued in the mobility management entity (MME) buffer and dispatched in a first in first out (FIFO) basis. The conventional permitted duration between handover command and handover execution is between 0.5 seconds and 1.5 seconds. To prevent holding the network resources for long durations, a handover termination duration was set to the lower bound of this conventional permitted duration, which was 0.5 seconds, such that handovers taking longer this duration were explicitly dropped. The reduced delays during the handover process facilitated the incorporation of entities authentication before subscribers can be transferred to the target cell. Simulation results showed the developed protocol greatly reduced handover delays to an average of 0.048 seconds. In addition, the source evolved Node-B (eNB), user equipment (UE) and target eNB were able to authenticate each other to boost security during the handover process.},
     year = {2020}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Delay Sensitive Protocol for High Availability LTE Handovers
    AU  - Vincent Omollo Nyangaresi
    AU  - Silvance Onyango Abeka
    AU  - Anthony Joachim Rodrigues
    Y1  - 2020/04/01
    PY  - 2020
    N1  - https://doi.org/10.11648/j.ajnc.202009012.11
    DO  - 10.11648/j.ajnc.202009012.11
    T2  - American Journal of Networks and Communications
    JF  - American Journal of Networks and Communications
    JO  - American Journal of Networks and Communications
    SP  - 1
    EP  - 10
    PB  - Science Publishing Group
    SN  - 2326-8964
    UR  - https://doi.org/10.11648/j.ajnc.202009012.11
    AB  - Long delays during the handover process lead to dropped calls which deteriorate the network quality of service. In addition, these delays impede the incorporation of authentication during the handover process which exposes the handover process to attacks such as desynchronization, network masquerading and session hijacking. In this paper, a delay sensitive protocol is developed based on the neuro-fuzzy optimization process and tracking area partitioning into no handover region, low probability handover region and high probability handover region that facilitated advance buffering of the figures of merit. The protocol computes the average delays during the handover process such that handovers taking longer durations than the average value are queued in the mobility management entity (MME) buffer and dispatched in a first in first out (FIFO) basis. The conventional permitted duration between handover command and handover execution is between 0.5 seconds and 1.5 seconds. To prevent holding the network resources for long durations, a handover termination duration was set to the lower bound of this conventional permitted duration, which was 0.5 seconds, such that handovers taking longer this duration were explicitly dropped. The reduced delays during the handover process facilitated the incorporation of entities authentication before subscribers can be transferred to the target cell. Simulation results showed the developed protocol greatly reduced handover delays to an average of 0.048 seconds. In addition, the source evolved Node-B (eNB), user equipment (UE) and target eNB were able to authenticate each other to boost security during the handover process.
    VL  - 9
    IS  - 1
    ER  - 

    Copy | Download

Author Information
  • School of Informatics & Innovative Systems, Jaramogi Oginga Odinga University of Science & Technology, Bondo, Kenya

  • School of Informatics & Innovative Systems, Jaramogi Oginga Odinga University of Science & Technology, Bondo, Kenya

  • School of Informatics & Innovative Systems, Jaramogi Oginga Odinga University of Science & Technology, Bondo, Kenya

  • Sections