Skip to main content

Intelligent Target Cell Selection Algorithm for Low Latency 5G Networks

  • Chapter
  • First Online:
Advances in Computational Intelligence and Communication

Abstract

Security and efficiency during the handover process are critical challenges in 5G heterogeneous networks owing to its strict low latency and security requirements. The 5G networks support many services and communication paradigms. Examples of these applications include as Internet of Things (IoT), vehicular ad hoc networks (VANETs), device-to-device communication (D2D), among others. As such, security lapses in the core network can easily escalate to the supported communication devices and networks and vice versa. Unfortunately, legacy cellular networks deploy the received signal strength indicator (RSSI) as the only parameter during the handover process. This results in increased handover latencies, packet losses, and high handover failure probability. Consequently, other protocols have been introduced that deploy additional handover parameters such as data rates, service costs, battery power, bandwidth, and energy consumption. However, these schemes only deal with efficiency of the handoff process but rarely consider security and privacy issues. Conversely, security and privacy protocols rarely address efficiency aspects of the handover process. In this paper, an algorithm that leverages on artificial neural networks coupled with fuzzy logic for target cell selection is presented. Based on the obtained results, there is a 56.1% reduction in handover latency and a 38.8% reduction in packet losses when the proposed scheme is deployed. In terms of security, it upholds both backward and forward key secrecy. In addition, desynchronization and replay and attacks are effectively thwarted in the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naeem, B., Ngah, R., Hashim, S.Z.M.: Reduction in ping-pong effect in heterogeneous networks using fuzzy logic. Soft. Comput. 23(1), 269–283 (2019)

    Article  Google Scholar 

  2. Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O.: ANN-FL secure handover protocol for 5G and beyond networks. In: Zitouni, R., Phokeer, A., Chavula, J., Elmokashfi, A., Gueye, A., Benamar, N. (eds.) Towards New e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 361. Springer, Cham (2021)

    Google Scholar 

  3. Azzali, F., Ghazali, O., Omar, M.H.: Fuzzy Logic-based Intelligent Scheme for Enhancing QoS of Vertical Handover Decision in Vehicular Ad-hoc Networks. International Research and Innovation Summit (IRIS2017), vol. 226, pp. 1–12 (2017)

    Google Scholar 

  4. Pragati, K., Haridas, S.L.: Reducing Ping-Pong Effect in Heterogeneous Wireless Networks Using Machine Learning Intelligent Communication, Control and Devices, pp. 697–705 (2019)

    Google Scholar 

  5. Yang, H., Raza, S.M., Kim, M., Le, D.T., Van Vo, V., Choo, H.: Next point-of-attachment selection based on long short term memory model in wireless networks. In: 14th International Conference on Ubiquitous Information Management and Communication (IMCOM), pp. 1–4 (2020)

    Google Scholar 

  6. Nyangaresi, V.O., Abeka, S.O., Rodrigues, A.J.: Tracking area boundary-aware protocol for pseudo stochastic mobility prediction in LTE networks. Inf. Technol. Comput. Sci. 5, 52–62 (2020)

    Google Scholar 

  7. Donald, E., Nosa, F.: Analyzing GSM insecurity. Int. J. Res. Sci. Innov. 3(10), 10–18 (2016)

    Google Scholar 

  8. Taha, M., Parra, L., Garcia, L., Lloret, J.: An intelligent handover process algorithm in 5G networks: The use case of mobile cameras for environmental surveillance. In: Proceedings of the 2017 IEEE International Conference on Communications Workshops, ICC Workshops 2017, Paris, France, pp. 840–844 (2017)

    Google Scholar 

  9. Alican, O., Maode, M.: Secure and efficient vertical handover authentication for 5G HetNets. In: Proceedings of IEEE International Conference on Information Communication and Signal Processing, pp. 26–32 (2018)

    Google Scholar 

  10. Arshad, R., ElSawy, H., Sorour, S., Al-Naffouri, T.Y., Alouini, M.S.: Handover management in dense cellular networks: a stochastic geometry approach. In: 2016 IEEE international conference on communications (ICC), pp. 1–7. IEEE (2016)

    Google Scholar 

  11. Yazdinejad, A., Parizi, R.M., Dehghantanha, A., Choo, K.K.R.: Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks. IEEE Trans. Netw. Sci. Eng. (2019) 1–12 (2019)

    Google Scholar 

  12. Hu, S., Yu, B., Qian, C., Xiao, Y., Xiong, Q., Sun, C., Gao, Y.: Non-orthogonal interleave-grid multiple access scheme for industrialinternet of things in 5G network. IEEE Trans. Indus. Inf. 14(12), 5436–5446 (2018)

    Article  Google Scholar 

  13. Cao, J., Ma, M., Li, H., Zhang, Y., Luo, Z.: A survey on security aspects for LTE and LTE-A networks. IEEE Commun. Surv. TUTs. 16(1), 283–302 (2014)

    Article  Google Scholar 

  14. Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O.: Neuro-fuzzy based handover authentication protocol for ultra dense 5G networks. In: 2020 2nd Global Power, Energy and Communication Conference (GPECOM), IEEE, pp. 339–344 (2020)

    Google Scholar 

  15. Bilen, T., Berk, C., Kaushik, R.C.: Handover management in software-defined ultra-dense 5G networks. IEEE Netw. 17, 49–55 (2017)

    Article  Google Scholar 

  16. Amit, K., Hari O.: Design of a USIM and ECC based handover authentication schemefor 5G-WLAN heterogeneous networks. Digital Communications and Networks, pp. 1–13 (2019)

    Google Scholar 

  17. Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O.: Efficient group authentication protocol for secure 5g enabled vehicular communications. In: 2020 16th International Computer Engineering Conference (ICENCO), IEEE, pp. 25–30 (2020)

    Google Scholar 

  18. Cheng, X., Xiaohong, H., Maode, M., Hong, B.: An anonymous handover authentication scheme based on LTE-A for vehicular networks. Wirel. Commun. Mob. Comput. 2018, 1–16 (2018)

    Article  Google Scholar 

  19. Taha, M., Jimenez, J.M., Canovas, A., Lloret, J.: Intelligent algorithm for enhancing MPEG-DASH QoE in Embms. Netw. Protoc. Algorithm. 9(3–4), 94 (2018)

    Article  Google Scholar 

  20. Phemina, M., Sendhilnathan, S.: Fuzzy based mobility management in 4G wireless networks. Braz. Arch. Biol. Technol. 59(2), 1–13 (2017)

    Google Scholar 

  21. Coqueiro, T., José, J., Tássio, C., Renato, F.: A fuzzy logic system for vertical handover and maximizing battery lifetime in heterogeneous wireless multimedia networks. Wirel. Commun. Mob. Comput. 2019, 1–14 (2019)

    Article  Google Scholar 

  22. Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O.: Machine learning protocol for secure 5G handovers. Int. J. Wirel. Inf. Netw. pp. 1–22 (2022)

    Google Scholar 

  23. Mahira, A.G., Subhedar, M.S.: Handover decision in wireless heterogeneous networks based on feed forward artificial neural network. In: Computational Intelligence in Data Mining, pp. 663–669. Springer, Singapore (2017)

    Chapter  Google Scholar 

  24. Benaatou, W., Latif, A., Pla, V.: Applying ANFIS model in decision-making of vertical handover between macrocell and femtocell integrated network. J. Telecommun. Electron. Comput. Eng. 11(1), 57–62 (2019)

    Google Scholar 

  25. Shanmugam, K.: A novel candidate network selection based handover management with fuzzy logic in heterogeneous wireless networks. In: 4th International Conference on Advanced Computing and Communication Systems (ICACCS), IEEE, pp. 1–6 (2017)

    Google Scholar 

  26. Imad, E., Rachid, S., Mohammed, E.: Vertical handover decision algorithm using ants' colonies for 4G heterogeneous wireless networks. J. Comput. Netw. Commun. 2016, 1–15 (2016)

    Google Scholar 

  27. Aibinu, A., Onumanyi, J., Adedigba, P., Ipinyomi, M., Folorunso, T., Salami, M.: Development of hybrid artificial intelligent based handover decision algorithm. Int. J. Eng. Sci. Technol. 20(2), 381–390 (2017)

    Google Scholar 

  28. Wu, T.Y., Lee, Z., Obaidat, M.S., Kumari, S., Kumar, S., Chen, C.M.: An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access. 8, 28096–28108 (2020)

    Article  Google Scholar 

  29. Lai, Y., Cheng, P., Lee, C., CKu, C.: A new ticket-based authentication mechanism for fast handover in mesh network. Department of Photonics and Communication Engineering, Asia University, Taichung, Taiwan, pp. 1–18 (2016)

    Google Scholar 

  30. Copet, P., Marchetto, G., Sisto, R., Costa, L.: Formal Verification of LTE-UMTS Handover Procedures. IEEE, pp. 1–8 (2015)

    Google Scholar 

  31. Lin, Y., Longjhuang, W., Chen, Y.C.: Enhanced 4G LTE authentication and handover mechanism. Int J Electr Electron Data Commun. 3(9), 45–47 (2015)

    Google Scholar 

  32. Vanga, O., Das, A.K., Goswami, A.: An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J. Inf. Secur. Appl. 21, 1–19 (2015)

    Google Scholar 

  33. Wu, F., Li, X., Xu, L., Sangaiah, A.K., Rodrigues, J.J.: Authentication protocol for distributed cloud computing: an explanation of the security situations for internet-of-things-enabled devices. IEEE Consum. Electron. Mag. 7(6), 38–44 (2018)

    Article  Google Scholar 

  34. Amin, R., Kumar, N., Biswas, G.P., Iqbal, R., Chang, V.: A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Futur. Gener. Comput. Syst. 78, 1005–1019 (2018)

    Article  Google Scholar 

  35. Mahmoud E.O., Mohamed H.M., Hassan A.: Design and simulation of a new intelligent authentication for handover over 4G (LTE) mobile communication network. In: Proceedings of the 11th ICEENG Conference, pp. 1–12 (2018)

    Google Scholar 

  36. Sridevi, B., Mohan, D.: Security analysis of handover key management among 4G LTE entities using device certification. Int. J. Electr. Comput. Eng. Commun. 1(2), 1–7 (2015)

    Google Scholar 

  37. Nyangaresi, V.O., Abeka, S.O., Rodrigues, A.J.: Delay sensitive protocol for high availability LTE handovers. Am. J. Netw. Commun. 9(1), 1–10 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vincent Omollo Nyangaresi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Nyangaresi, V.O., Al Sibahee, M.A., Abduljabbar, Z.A., Alhassani, A., Abduljaleel, I.Q., Abood, E.W. (2023). Intelligent Target Cell Selection Algorithm for Low Latency 5G Networks. In: Hina, M.D., Ramdane-Cherif, A., Zitouni, R., Soukane, A. (eds) Advances in Computational Intelligence and Communication. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-19523-5_6

Download citation

Publish with us

Policies and ethics