Javascript must be enabled to continue!
SECURITY ARCHITECTURE ON WIRELESS NETWORK TRAFFIC HANDOFF : A REVIEW
View through CrossRef
This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur. In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks. Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks. The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study. Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021. This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.
Title: SECURITY ARCHITECTURE ON WIRELESS NETWORK TRAFFIC HANDOFF : A REVIEW
Description:
This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur.
In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks.
Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks.
The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study.
Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021.
This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.
Related Results
Development of nursing handoff competency scale: a methodological study
Development of nursing handoff competency scale: a methodological study
Abstract
Background
Nursing handoff competency is the ability of the nurse performing the handoff to select and interpret the necessary information ...
Evaluation of Handoff Drop Call Rate in GSM Network in Delta State with Dynamic Cut off Channel Allocation Scheme
Evaluation of Handoff Drop Call Rate in GSM Network in Delta State with Dynamic Cut off Channel Allocation Scheme
This study aims at evaluating Handoff drop call rate in GSM Network using dynamic Cut off Channel Allocation Scheme by evaluating different Mobile Network Operators, MNOs, and comp...
The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
Traffic Prediction in 5G Networks Using Machine Learning
Traffic Prediction in 5G Networks Using Machine Learning
The advent of 5G technology promises a paradigm shift in the realm of
telecommunications, offering unprecedented speeds and connectivity. However, the
...
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
The increasing complexity of urban transportation systems and the growing volume of vehicles have made traffic congestion a persistent challenge in modern cities. Efficient traffic...
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Cross-layer security solution for secure communication of sensorsin Wireless Sensor Networks
Cross-layer security solution for secure communication of sensorsin Wireless Sensor Networks
Safe path-finding is extremely necessary for multihop wireless systems such as Wireless Sensor Networks. Multihop wireless systems are more unprotected to safety outbreaks as ass...
MODELİNG OF TRAFFİC LİGHT CONTROL SYSTEMS
MODELİNG OF TRAFFİC LİGHT CONTROL SYSTEMS
Traffic light control systems are commonly utilized to monitor and manage the flow of autos across multiple road intersections. Since traffic jams are ubiquitous in daily life, A c...

