International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.4, No.6, Jun. 2012

Dynamic Inter Arrival Time Based Seamless Handoff for Mobile WIMAX Ping-Pong Calls Bypassing PKMv2 EAP Authentication

Full Text (PDF, 1335KB), PP.56-64

Views:176   Downloads:9



Index Terms

IEEE802.16, WiMAX Handoff Delay, Authentication cost, Ping Pong, TEK utilization


The rapid growth of wireless communication and its persistent use influences all walks of life. Mobile WiMAX IEEE 802.16e standard enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. It aims to provide seamless support to its users but an inevitable is that the long delay which occurs during the handoff management in every network process. This paper proposes a Dynamic Interval based Processing Algorithm to separate ping-pong users from the pool of users and to process them separately thus reducing the overhead of network re-entry process. Incoming users are divided into three categories like new user, old user and ping pong user. New user should undergo all the phases of network entry process, old user is provided with authentication key which leads to skipping of steps in generation of keys. Proposed algorithm deals with identifying the ping pong users by calculating the inter arrival duration and rate with same base station. When assured authenticated ping-pong users enter the network next time within the allotted time they will be provided with last used Traffic Encryption Key (TEK) thus bypassing key generation phase . It is observed that the proposed work performs the authentication phase and cancels the key generation phase which leads to minimum network entry delay and it saves to the maximum of 80% processing time. The network model was developed using Network Simulator and the algorithm was implemented in MATLAB GUIDE which gets connected to the database developed in MYSQL.This approach is justified through its timing analysis result which proves the efficient swift in the handoff processes.

Cite This Paper

B.Sridevi,S.Rajaram,"Dynamic Inter Arrival Time Based Seamless Handoff for Mobile WIMAX Ping-Pong Calls Bypassing PKMv2 EAP Authentication", IJCNIS, vol.4, no.6, pp.56-64,2012.


[1]Jeffrey J.Andrews,Arunabha Ghosh,Rias Muhamed , "Fundamentals of WIMAX Understanding Broadband Wireless Networking", Prentice Hall, 2007

[2]Loutfi Nuaymi "WiMAX Technology For Broadband Wireless Access", John Wiley & Sons Ltd,2007

[3]B. Rong, Y. Qian, K. Lu, H.-H.Chen, and M. Guizani, "Call admission control optimization in WiMAX networks," IEEE Transactions on Vehicular Technology, vol. 57, no. 4, pp. 2509–2522, Jul. 2008.

[4]Shih-Feng Hsu and Yi-Bing Lin, Fellow, IEEE, "A Key Caching Mechanism for Reducing WiMAX Authentication Cost in Handoff ",IEEE Trans. Veh. Tech. vol 58 no 8, october2009.

[5]Shun-Ren Yang, Chien-Chi Kao, Wai-Chi Kan, and Tzung-Chin Shih "Handoff Minimization Through a Relay Station Grouping Algorithm With Efficient Radio-Resource Scheduling Policies for IEEE 802.16j Multihop Relay Networks" IEEE Transactions On Vehicular Technology, Vol. 59, 2010 

[6]Ji Hoon Lee, Sangheon Pack, Member, Taekyoung Kwon and Yanghee Choi "Reducing Handover Delay by Location Management in Mobile WiMAX Multicast and Broadcast Services" IEEE Transactions On Vehicular Technology, Vol. 60, 2011 

[7]Kheya Banerjee, Sheikh Md. Rabiul Islam, Zulkernine Ibne Tahasin, Rokon Uddin "An Efficient Handover Scheme for PMIPv6 in IEEE 802.16/WiMAX Network" International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 ,2011 

[8]Jianlin Guo, Tsutomu Tsuboi, Jinyun Zhang "Location Aware Fast Handover Between WiMAX and WiFi Networks" MITSUBISHI ELECTRIC RESEARCH LABORATORIES , http://www.merl. com, 2010.

[9]Alessandro De Sanctis, Marco Rastell, Daniele Tortora "METHOD FOR PREVENTING PING-PONG HANDOVER EFFECT IN MOBILE WIMAX NETWORKS",United States Patent Application Publication,2009

[10]Guangbin Fan,Ivan Stojmenovic, and Jingyuan Zhang "Elimination of Generalized Ping-Pong Effects Using Triple-Layers of Location Areas in Cellular Networks", Computer Science and Information Systems Vol. 5, No. 1, June 2008

[11]Lin, P. Shin-Ming Cheng Wanjiun Liao,"Modeling Key Caching for Mobile IP Authentication, Authorization, and Accounting (AAA) Services " IEEE Transactions on Vehicular Technology, vol. 58,pp. 3596 – 3608, Sept. 2009

[12]Alina Olteanu, Yang Xiao,Yan Zhang Optimization Between AES Security and Performance for IEEE 802.15.3 WPAN" , IEEE Transactions On Wireless Communications, Vol. 8, 2009

[13]Jung Je Son, Changai Koo," Enhancement of BS Initiated Handoff Algorithm for 802.16e", IEEE 802.16 Broadband Wireless Access Working Group

[14]B.Sridevi and Dr.S.Rajaram ,"Compressed Key Exchange and Key Caching in PKMv2-EAP Mobile WiMAX Authentication" , European Journal of Scientific and Research, March 2012

[15]B.Sridevi and Dr.S.Rajaram ,"GUI based cost effective handoff management in WiMAX Network entry process using key caching mechanism", SEISCON 2011, IEEE explore, Feb.2012