Loading

Open Issues in Secure Vertical Handoff Techniques for Next Generation Wireless Networks
Nagesha A. G.1, Mahesh G.2, Gowrishankar3

1Nagesha A G, Department of ISE ACIT, Bengaluru (Karnataka), India.

2Dr. Mahesh G, Department of CSE, BMSIT & M, Bengaluru (Karnataka), India.

3Dr. Gourishankar S., Department of CSE, BMSCE, Bengaluru (Karnataka), India.

Manuscript received on 04 December 2019 | Revised Manuscript received on 12 December 2019 | Manuscript Published on 31 December 2019 | PP: 290-296 | Volume-9 Issue-2S December 2019 | Retrieval Number: B10671292S19/2019©BEIESP | DOI: 10.35940/ijitee.B1067.1292S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The 4G Wireless Networks (WN) have not only provided seamless connection; they also strive to provide Quality of Service (QoS) to the users. However, providing efficient QoS to the users is quite often challenging due to large number of users and significant traffic load. One of the popular techniques to provide consistent QoS to the user is Vertical Handoff (VH). The main concept of VH is to migrate the user to another WN which can provide the requested QoS. Even though substantial contribution has been made in the literature for VH techniques, security oriented VH techniques are limited in number. Security aspect has become critical in Next Generation WN, due to new form of threats which are being introduced, and VH techniques also need to focus on security issues to provide safe and robust communication. In the literature, survey on different security threats, secure VH techniques and future issues has not been effectively presented; in this work, comprehensive survey on all these aspects is presented to aid future research in secure VH.

Keywords: Next Generation Wireless Networks, Vertical Handoff, Security.
Scope of the Article: Heterogeneous Wireless Networks