Open Access iconOpen Access

ARTICLE

crossmark

Enhance Vertical Handover Security During Execution Phase in Mobile Networks

Omar Khattab*

Department of Computer Science and Engineering, Kuwait College of Science and Technology (KCST), Kuwait

* Corresponding Author: Omar Khattab. Email: email

Computers, Materials & Continua 2022, 72(2), 3863-3875. https://doi.org/10.32604/cmc.2022.026102

Abstract

The Vertical Handover (VHO) is one of the most vital features provided for the heterogeneous mobile networks. It allows Mobile Users (MUs) to keep ongoing sessions without disruption while they continuously move between different Radio Access Technologies (RATs) such as Wireless Fidelity (Wi-Fi), Global System for Mobile Communication (GSM), Universal Mobile Telecommunications System (UMTS), Long Term Evolution (LTE) and Fifth Generation (5G). In order to fulfill this goal, the VHO must comply to three main phases: starting of collecting the required information and then passing it for decision phase to obtain the best available RAT for performing VHO by execution phase eventually. However, the execution phase still encounters some security issues which are exploited by hackers in launching malicious attacks such as ransomware, fragmentation, header manipulation, smurf, host initialization, reconnaissance, eavesdropping, Denial of Service (DoS), spoofing, Man in the Middle (MITM) and falsification. This paper thoroughly studies the recent security issues for hundreds VHO approaches found in the literature and comes up with a secure procedure to enhance VHO security during execution phase. A numerical analysis results of the proposed procedure are effectively evaluated in terms of security and signaling cost. Compared with the recent related work found in literature, the analysis demonstrates that the security is successfully improved by 20% whereas signaling cost is maintained as in non-proposed procedure.

Keywords


Cite This Article

O. Khattab, "Enhance vertical handover security during execution phase in mobile networks," Computers, Materials & Continua, vol. 72, no.2, pp. 3863–3875, 2022. https://doi.org/10.32604/cmc.2022.026102



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1354

    View

  • 567

    Download

  • 0

    Like

Share Link