Abstract-The present world is encouraging interconnection of different types of networks intern the internet usage for all purpose applications. This leads to ensure seamless handover and repetitive vertical handovers. The heterogeneous network has handover challenge as well as the network security. In our previous work we have proposed third party Intervention for vertical handover. In this proposed work we have extended the previous work by providing security enhancement. The simulation results show that there is a reduction in leakages and attacks after applying our scheme.Keyword-Security, Handover, Heterogeneous Networks, UNI_MOB. I. INTRODUCTION Seamless mobility and roaming is the essential feature of today's wireless communication system. In country like India there is huge demand for seamless internet service access which cannot be met by single operator or single technology. Handover is the important step for this continuous connectivity. It enables the user to maintain session from different access network. The mobile internet availability made people to access internet any time anywhere. The success of telecom operator lies in providing any time access without affecting the Quality of Service. This requires seamless handover across different networks. With less availability of spectrum in competitive market like India, to achieve seamless handover, third party handover is needed. The third party handover will brokerage across different operator networks and services to achieve seamless handover. In our earlier work [1], we have proposed the solution for seamless handover using third party handover solution. The third party handover was using Service Oriented Architecture (SOA). The individual operator services integrated with third party server just like accessing a web service with loose coupling and third party server made critical decisions regarding handover and authentication. The solution was named UNI-MOB in [1] paper. It was to enable SOA based third party vertical handover solution with user centric. But the solution has several security problems and if not addressed attacker can make the solution not-usable. In this paper we survey the different security solutions in vertical handover and list the security problems in our solution and also propose a solution for the security problems without affecting the delay in bigger way. The ultimate aim of the security solution is that light weight without affecting the delay. The rest of this paper organized as follows. In section 2, we did the literature survey on security in vertical handover. In section 3, defines the problem definition of our proposed work. Section 4 describes the mathematical model for our proposed work. In section 5 analysis the performance of our proposed work via simulations and section 5 concludes this paper.
II. SURVEYIn [2], proposed a Media Independent Pre-Authentication handover optimization framework. It provide optimization for inter domain and inter technology handover, and also achieve significant reduction in handov...