2019
DOI: 10.1016/j.future.2019.03.031
|View full text |Cite
|
Sign up to set email alerts
|

Extension of MIH for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 41 publications
0
15
0
Order By: Relevance
“…Content may change prior to final publication. Trust-based relaying [147] Cluster-based relaying [148] Secure MACbased relaying [149], [150] Cross-layerbased relaying [151]- [153] Topologybased relaying [154] IP-based relaying [155]- [157] Mobility-based relaying [146], [158], [159] Proactive [157], [158], [160] Reactive [161] One-way [162] Two-way [163], [164] Freshness-based [146], [156], [164]- [170] Encryption-based [146], [154], [156], [163], [164], [166]- [174] Access-based [146], [163], [164], [166]- [174] System Integrity-based [132], [156], [163], [164], [166], [169], [173], [174] This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.…”
Section: Security-aware Protocols For Smart M-iotmentioning
confidence: 99%
See 2 more Smart Citations
“…Content may change prior to final publication. Trust-based relaying [147] Cluster-based relaying [148] Secure MACbased relaying [149], [150] Cross-layerbased relaying [151]- [153] Topologybased relaying [154] IP-based relaying [155]- [157] Mobility-based relaying [146], [158], [159] Proactive [157], [158], [160] Reactive [161] One-way [162] Two-way [163], [164] Freshness-based [146], [156], [164]- [170] Encryption-based [146], [154], [156], [163], [164], [166]- [174] Access-based [146], [163], [164], [166]- [174] System Integrity-based [132], [156], [163], [164], [166], [169], [173], [174] This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.…”
Section: Security-aware Protocols For Smart M-iotmentioning
confidence: 99%
“…Such schemes are responsible for securing the path of the nodes when they are moving in an intraor inter-mode of a given authentication server. Mobility management schemes can be studied as distributed, centralized, semi-distributed or even hierarchical [146], [158], [159].…”
Section: A Secure Routing-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the traffic remains the same, a similar message size, as computed previously, is used for evaluating the overall latency of the network. Thus, in this scenario, the network latency is calculated as [ 64 ]: where is the one-frame transport delay, is the message size, is the frame size, is the inter-frame time, is the link layer delay, is the number of intermediate hops, is the network bandwidth and is the wired delay.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Although 5G networks aim at increasing the speed as well as the quality of the transmissions, this reduces the time window for applying security mechanisms to prevent any active attacks on the networks. Thus, new mechanisms are needed for securing these fast communications or applicability approach of existing solutions needs to be changed to cope with the low-latency requirements of these networks [28]- [30]. Along with these attacks, it is desired the network should be free from insider threats as these may expose the internal functionalities which may lead to different types of attacks that are next to impossible to detect at the real time.…”
Section: Introductionmentioning
confidence: 99%