2021
DOI: 10.3906/elk-2101-123
|View full text |Cite
|
Sign up to set email alerts
|

An MIH-enhanced fully distributed mobility management (MF-DMM) solution for real and non-real time CVBR traffic classes in mobile internet

Parasuraman SANKARANARAYANAN,
Rajaraman GAYATHRI,
Ramachandiran TAMIJETCHELVY

Abstract: The integration of wireless access networks has progressed rapidly in recent years. Within the mobile communication environment, the operator provides multiple interface options for the mobile node (MN) to switch its connection to any access network during mobility to achieve the quality of service (QoS) for various traffic classes. The conventional centralised mobility management (CMM) scheme lacks reliability, dynamic anchoring and a single point of failure. This stimulates the distributed mobility managemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…Denial-of-Service Attacks in Wi-Fi Direct Device-to-Device Networks are thoroughly studied and analyzed. Such attacks force the Wi-Fi connection to drop and prevent the detection of the access point or cellular network ( Sankaranarayanan, Gayathri & Tamijetchelvy, 2021 ; Hadiks et al, 2014 ). Wi-Fi networks are susceptible to impersonation attacks, where SSID or MAC/IP addresses mimic those of legitimate devices ( Liu et al, 2019 ).…”
Section: Literature Workmentioning
confidence: 99%
“…Denial-of-Service Attacks in Wi-Fi Direct Device-to-Device Networks are thoroughly studied and analyzed. Such attacks force the Wi-Fi connection to drop and prevent the detection of the access point or cellular network ( Sankaranarayanan, Gayathri & Tamijetchelvy, 2021 ; Hadiks et al, 2014 ). Wi-Fi networks are susceptible to impersonation attacks, where SSID or MAC/IP addresses mimic those of legitimate devices ( Liu et al, 2019 ).…”
Section: Literature Workmentioning
confidence: 99%