Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

SECURITY ARCHITECTURE ON WIRELESS NETWORK TRAFFIC HANDOFF : A REVIEW

View through CrossRef
This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur. In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks. Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks. The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study. Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021. This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.
Universitas Wiralodra
Title: SECURITY ARCHITECTURE ON WIRELESS NETWORK TRAFFIC HANDOFF : A REVIEW
Description:
This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur.
In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks.
Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks.
The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study.
Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021.
This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.

Related Results

Development of nursing handoff competency scale: a methodological study
Development of nursing handoff competency scale: a methodological study
Abstract Background Nursing handoff competency is the ability of the nurse performing the handoff to select and interpret the necessary information ...
Evaluation of Handoff Drop Call Rate in GSM Network in Delta State with Dynamic Cut off Channel Allocation Scheme
Evaluation of Handoff Drop Call Rate in GSM Network in Delta State with Dynamic Cut off Channel Allocation Scheme
This study aims at evaluating Handoff drop call rate in GSM Network using dynamic Cut off Channel Allocation Scheme by evaluating different Mobile Network Operators, MNOs, and comp...
Traffic Prediction in 5G Networks Using Machine Learning
Traffic Prediction in 5G Networks Using Machine Learning
The advent of 5G technology promises a paradigm shift in the realm of telecommunications, offering unprecedented speeds and connectivity. However, the ...
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
The increasing complexity of urban transportation systems and the growing volume of vehicles have made traffic congestion a persistent challenge in modern cities. Efficient traffic...
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
MODELİNG OF TRAFFİC LİGHT CONTROL SYSTEMS
MODELİNG OF TRAFFİC LİGHT CONTROL SYSTEMS
Traffic light control systems are commonly utilized to monitor and manage the flow of autos across multiple road intersections. Since traffic jams are ubiquitous in daily life, A c...
Handoff Scheme for 5G Mobile Networks Based on Markovian Queuing Model
Handoff Scheme for 5G Mobile Networks Based on Markovian Queuing Model
Wireless and mobile communication systems are in continuous evolution every day. The fifth generation (5G) is the next major phase of the mobile telecommunication and wireless syst...
Developing an emergency medicine handoff tool: an electronic Delphi approach
Developing an emergency medicine handoff tool: an electronic Delphi approach
Abstract Background Handoffs at the end of clinical shifts occur with high frequencies in the emergency department setting and they pose an increase...

Back to Top