Abstract
Security and efficiency during the handover process are critical challenges in 5G heterogeneous networks owing to its strict low latency and security requirements. The 5G networks support many services and communication paradigms. Examples of these applications include as Internet of Things (IoT), vehicular ad hoc networks (VANETs), device-to-device communication (D2D), among others. As such, security lapses in the core network can easily escalate to the supported communication devices and networks and vice versa. Unfortunately, legacy cellular networks deploy the received signal strength indicator (RSSI) as the only parameter during the handover process. This results in increased handover latencies, packet losses, and high handover failure probability. Consequently, other protocols have been introduced that deploy additional handover parameters such as data rates, service costs, battery power, bandwidth, and energy consumption. However, these schemes only deal with efficiency of the handoff process but rarely consider security and privacy issues. Conversely, security and privacy protocols rarely address efficiency aspects of the handover process. In this paper, an algorithm that leverages on artificial neural networks coupled with fuzzy logic for target cell selection is presented. Based on the obtained results, there is a 56.1% reduction in handover latency and a 38.8% reduction in packet losses when the proposed scheme is deployed. In terms of security, it upholds both backward and forward key secrecy. In addition, desynchronization and replay and attacks are effectively thwarted in the proposed algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Naeem, B., Ngah, R., Hashim, S.Z.M.: Reduction in ping-pong effect in heterogeneous networks using fuzzy logic. Soft. Comput. 23(1), 269–283 (2019)
Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O.: ANN-FL secure handover protocol for 5G and beyond networks. In: Zitouni, R., Phokeer, A., Chavula, J., Elmokashfi, A., Gueye, A., Benamar, N. (eds.) Towards New e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 361. Springer, Cham (2021)
Azzali, F., Ghazali, O., Omar, M.H.: Fuzzy Logic-based Intelligent Scheme for Enhancing QoS of Vertical Handover Decision in Vehicular Ad-hoc Networks. International Research and Innovation Summit (IRIS2017), vol. 226, pp. 1–12 (2017)
Pragati, K., Haridas, S.L.: Reducing Ping-Pong Effect in Heterogeneous Wireless Networks Using Machine Learning Intelligent Communication, Control and Devices, pp. 697–705 (2019)
Yang, H., Raza, S.M., Kim, M., Le, D.T., Van Vo, V., Choo, H.: Next point-of-attachment selection based on long short term memory model in wireless networks. In: 14th International Conference on Ubiquitous Information Management and Communication (IMCOM), pp. 1–4 (2020)
Nyangaresi, V.O., Abeka, S.O., Rodrigues, A.J.: Tracking area boundary-aware protocol for pseudo stochastic mobility prediction in LTE networks. Inf. Technol. Comput. Sci. 5, 52–62 (2020)
Donald, E., Nosa, F.: Analyzing GSM insecurity. Int. J. Res. Sci. Innov. 3(10), 10–18 (2016)
Taha, M., Parra, L., Garcia, L., Lloret, J.: An intelligent handover process algorithm in 5G networks: The use case of mobile cameras for environmental surveillance. In: Proceedings of the 2017 IEEE International Conference on Communications Workshops, ICC Workshops 2017, Paris, France, pp. 840–844 (2017)
Alican, O., Maode, M.: Secure and efficient vertical handover authentication for 5G HetNets. In: Proceedings of IEEE International Conference on Information Communication and Signal Processing, pp. 26–32 (2018)
Arshad, R., ElSawy, H., Sorour, S., Al-Naffouri, T.Y., Alouini, M.S.: Handover management in dense cellular networks: a stochastic geometry approach. In: 2016 IEEE international conference on communications (ICC), pp. 1–7. IEEE (2016)
Yazdinejad, A., Parizi, R.M., Dehghantanha, A., Choo, K.K.R.: Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks. IEEE Trans. Netw. Sci. Eng. (2019) 1–12 (2019)
Hu, S., Yu, B., Qian, C., Xiao, Y., Xiong, Q., Sun, C., Gao, Y.: Non-orthogonal interleave-grid multiple access scheme for industrialinternet of things in 5G network. IEEE Trans. Indus. Inf. 14(12), 5436–5446 (2018)
Cao, J., Ma, M., Li, H., Zhang, Y., Luo, Z.: A survey on security aspects for LTE and LTE-A networks. IEEE Commun. Surv. TUTs. 16(1), 283–302 (2014)
Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O.: Neuro-fuzzy based handover authentication protocol for ultra dense 5G networks. In: 2020 2nd Global Power, Energy and Communication Conference (GPECOM), IEEE, pp. 339–344 (2020)
Bilen, T., Berk, C., Kaushik, R.C.: Handover management in software-defined ultra-dense 5G networks. IEEE Netw. 17, 49–55 (2017)
Amit, K., Hari O.: Design of a USIM and ECC based handover authentication schemefor 5G-WLAN heterogeneous networks. Digital Communications and Networks, pp. 1–13 (2019)
Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O.: Efficient group authentication protocol for secure 5g enabled vehicular communications. In: 2020 16th International Computer Engineering Conference (ICENCO), IEEE, pp. 25–30 (2020)
Cheng, X., Xiaohong, H., Maode, M., Hong, B.: An anonymous handover authentication scheme based on LTE-A for vehicular networks. Wirel. Commun. Mob. Comput. 2018, 1–16 (2018)
Taha, M., Jimenez, J.M., Canovas, A., Lloret, J.: Intelligent algorithm for enhancing MPEG-DASH QoE in Embms. Netw. Protoc. Algorithm. 9(3–4), 94 (2018)
Phemina, M., Sendhilnathan, S.: Fuzzy based mobility management in 4G wireless networks. Braz. Arch. Biol. Technol. 59(2), 1–13 (2017)
Coqueiro, T., José, J., Tássio, C., Renato, F.: A fuzzy logic system for vertical handover and maximizing battery lifetime in heterogeneous wireless multimedia networks. Wirel. Commun. Mob. Comput. 2019, 1–14 (2019)
Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O.: Machine learning protocol for secure 5G handovers. Int. J. Wirel. Inf. Netw. pp. 1–22 (2022)
Mahira, A.G., Subhedar, M.S.: Handover decision in wireless heterogeneous networks based on feed forward artificial neural network. In: Computational Intelligence in Data Mining, pp. 663–669. Springer, Singapore (2017)
Benaatou, W., Latif, A., Pla, V.: Applying ANFIS model in decision-making of vertical handover between macrocell and femtocell integrated network. J. Telecommun. Electron. Comput. Eng. 11(1), 57–62 (2019)
Shanmugam, K.: A novel candidate network selection based handover management with fuzzy logic in heterogeneous wireless networks. In: 4th International Conference on Advanced Computing and Communication Systems (ICACCS), IEEE, pp. 1–6 (2017)
Imad, E., Rachid, S., Mohammed, E.: Vertical handover decision algorithm using ants' colonies for 4G heterogeneous wireless networks. J. Comput. Netw. Commun. 2016, 1–15 (2016)
Aibinu, A., Onumanyi, J., Adedigba, P., Ipinyomi, M., Folorunso, T., Salami, M.: Development of hybrid artificial intelligent based handover decision algorithm. Int. J. Eng. Sci. Technol. 20(2), 381–390 (2017)
Wu, T.Y., Lee, Z., Obaidat, M.S., Kumari, S., Kumar, S., Chen, C.M.: An authenticated key exchange protocol for multi-server architecture in 5G networks. IEEE Access. 8, 28096–28108 (2020)
Lai, Y., Cheng, P., Lee, C., CKu, C.: A new ticket-based authentication mechanism for fast handover in mesh network. Department of Photonics and Communication Engineering, Asia University, Taichung, Taiwan, pp. 1–18 (2016)
Copet, P., Marchetto, G., Sisto, R., Costa, L.: Formal Verification of LTE-UMTS Handover Procedures. IEEE, pp. 1–8 (2015)
Lin, Y., Longjhuang, W., Chen, Y.C.: Enhanced 4G LTE authentication and handover mechanism. Int J Electr Electron Data Commun. 3(9), 45–47 (2015)
Vanga, O., Das, A.K., Goswami, A.: An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J. Inf. Secur. Appl. 21, 1–19 (2015)
Wu, F., Li, X., Xu, L., Sangaiah, A.K., Rodrigues, J.J.: Authentication protocol for distributed cloud computing: an explanation of the security situations for internet-of-things-enabled devices. IEEE Consum. Electron. Mag. 7(6), 38–44 (2018)
Amin, R., Kumar, N., Biswas, G.P., Iqbal, R., Chang, V.: A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Futur. Gener. Comput. Syst. 78, 1005–1019 (2018)
Mahmoud E.O., Mohamed H.M., Hassan A.: Design and simulation of a new intelligent authentication for handover over 4G (LTE) mobile communication network. In: Proceedings of the 11th ICEENG Conference, pp. 1–12 (2018)
Sridevi, B., Mohan, D.: Security analysis of handover key management among 4G LTE entities using device certification. Int. J. Electr. Comput. Eng. Commun. 1(2), 1–7 (2015)
Nyangaresi, V.O., Abeka, S.O., Rodrigues, A.J.: Delay sensitive protocol for high availability LTE handovers. Am. J. Netw. Commun. 9(1), 1–10 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Nyangaresi, V.O., Al Sibahee, M.A., Abduljabbar, Z.A., Alhassani, A., Abduljaleel, I.Q., Abood, E.W. (2023). Intelligent Target Cell Selection Algorithm for Low Latency 5G Networks. In: Hina, M.D., Ramdane-Cherif, A., Zitouni, R., Soukane, A. (eds) Advances in Computational Intelligence and Communication. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-19523-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-19523-5_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-19522-8
Online ISBN: 978-3-031-19523-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)