Work place: School of Informatics and Innovative Systems, Jaramogi Oginga Odinga University of Science & Technology, Kisumu – Kenya.
E-mail: vincent@kisiiuniversity.ac.ke
Website:
Research Interests: Computer Networks, Computer systems and computational processes, Software Engineering, Computational Science and Engineering, Applied computer science
Biography
Vincent O. Nyangaresi, Bsc (TIT), Msc (IT Sec. & Audit) is a researcher in areas of data
communication and computer networks, network design and administration, distributed systems and information systems security. He is currently pursuing his PhD in Information Security and Audit. He has published numerous research articles covering areas such as communication systems, secure network communications, information systems acceptance modeling, TCP architecture and design, radio wave propagation, virtualization and cloud computing, among others. In addition, he lecturers in the fields of computer networks, digital forensics, software engineering, digital electronics and applied computer science.
By Vincent Omollo Nyangaresi Silvance Abeka Anthony Rodrigues
DOI: https://doi.org/10.5815/ijwmt.2018.04.02, Pub. Date: 8 Jul. 2018
Cellular networks are characterized by mobility in which subscribers move freely within the coverage area. Since the radio spectrum is a scarce resource, the available bandwidth is divided by using a combination of Time- and Frequency-Division Multiple Access (TDMA) Code Division Multiple Access (CDMA) and Frequency Division Multiple Access (FDMA). For communication process to succeed, the subscriber must be allocated some frequency band (FDMA), a time slot (TDMA) or pseudorandom binary sequence that modulates the carrier (CDMA). With the increasing number of users, these resources may become unavailable, leading to new call blocking or handover call blocking. Erlang B and Erlang C have been used in the past to model teletraffic blocking in Public Switched Telephone Network (PSTN). Unfortunately, Erlang B is only ideal when subscribers do not perform call re-attempts after their initial calls are blocked. On the other hand, Erlang C model is applicable only in networks where queuing is applied and can easily lead to higher blocking rates when the number of users is high. This is because it takes into consideration the number of instances in the queue as well as the resources under use. In this paper, teletraffic blocking probabilities that take into account additional cellular network concepts such as the number of mobile stations, call retries, channels reservation, overlays and underlays, user velocity, relative mobility, call priority, call arrival rates and signal to interference plus noise ratio (SINR) were synthesized. The simulation results showed that the developed teletraffic blocking probabilities were superior to the conventional Erlang B and Erlang C as they consider new concepts that exist in cellular networks that were not envisioned in traditional PSTN.
[...] Read more.By Vincent Omollo Nyangaresi Silvance Abeka Anthony Rodrigues
DOI: https://doi.org/10.5815/ijcnis.2018.05.06, Pub. Date: 8 May 2018
This paper examined the handovers in cellular networks from both functional and informational security point of view. The aim was to find out if the security goals of confidentiality, integrity and availability (CIA) are preserved during handovers. Whereas functional security is concerned with the proper operation of the handover procedures, informational security deals with confidentiality and integrity of the handover process. The global system for mobile communication provides data and voice communication services by partitioning coverage areas into hexagonal cells. Since mobility is a prime feature of cellular networks, handovers become significant for the continuity of ongoing calls. However, if these handovers are not handled carefully, session hijacking, masquerading and denial of service can be launched by transmitting at the correct timeslot and frequency. The results of the security investigation of the current handover techniques, methods, procedures, schemes and criteria revealed that the CIA triad was not assured during the handover period. The root cause of these attacks is high latency between handover request and handover execution. To address these shortcomings, this paper proposes an authenticated multi-factor neuro fuzzy handover protocol with low latency for both homogenous and heterogeneous cellular environments.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals