A Dynamic Hierarchical Mobility Management Protocol for Next Generation Wireless Metropolitan Area Networks

Author(s):  
Hairong Zhou ◽  
Chihsiang Yeh ◽  
Hussein T. Mouftah
2015 ◽  
Vol 7 (3) ◽  
pp. 1 ◽  
Author(s):  
Haider Noori AL-Hashimi ◽  
Waleed Noori Hussein

VANET Networks are one of the main next generation wireless networks which are envisaged to be an integration of homogeneous and heterogeneous wireless networks. The inter-networking of these wireless networks with the Internet will provide ubiquitous access to roaming network users. However, a seamless handover mechanism with negligible handover delay is required to maintain active connections during roaming across these networks. Several solutions, mainly involving host-based localized mobility management schemes, have been widely proposed to reduce handover delay among homogeneous and heterogeneous wireless networks. However, the handover delay remains high and unacceptable for delay-sensitive services such as real-time and multimedia services. Moreover, these services will be very common in next generation wireless networks. Unfortunately, these widely proposed host-based localized mobility management schemes involve the vehicle in mobility-related signalling hence effectively increasing the handover delay. Furthermore, these schemes do not properly address the advanced handover scenarios envisaged in future wireless networks. This paper, therefore, proposes a VANET mobility management framework utilizing cross-layer design, the IEEE 802.21 future standard, and the recently emerged network-based localized mobility management protocol, Proxy Mobile IPv6, to further reduce handover delay.


Author(s):  
Giorgos Kostopoulos ◽  
Nicolas Sklavos ◽  
Odysseas Koufopavlou

Wireless communications are becoming ubiquitous in homes, offices, and enterprises with the popular IEEE 802.11 wireless local area network (LAN) technology and the up-and-coming IEEE 802.16 wireless metropolitan area networks (MAN) technology. The wireless nature of communications defined in these standards makes it possible for an attacker to snoop on confidential communications or modify them to gain access to home or enterprise networks much more easily than with wired networks. Wireless devices generally try to reduce computation overhead to conserve power and communication overhead to conserve spectrum and battery power. Due to these considerations, the original security designs in wireless LANs and MANs used smaller keys, weak message integrity protocols, weak or one-way authentication protocols, and so forth. As wireless networks became popular, the security threats were also highlighted to caution users. A security protocol redesign followed first in wireless LANs and then in wireless MANs. This chapter discusses the security threats and requirements in wireless LANs and wireless MANs, with a discussion on what the original designs missed and how they were corrected in the new protocols. It highlights the features of the current wireless LAN and MAN security protocols and explains the caveats and discusses open issues. Our aim is to provide the reader with a single source of information on security threats and requirements, authentication technologies, security encapsulation, and key management protocols relevant to wireless LANs and MANs.


Sign in / Sign up

Export Citation Format

Share Document