Predictive Mobility Support with Secure Context Management for Vehicular Users

  • Minsoo Lee
  • Gwanyeon Kim
  • Sehyun Park
  • Ohyoung Song
  • Sungik Jun
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 229)


This paper presents a predictive mobility management framework with the secure context management in mobile networks. We devised the authentication method for seamless handovers that exploit the knowledge of the mobility prediction. Previous Access Router (AR) forwards the pre-established context information to the new AR in the predicted target wireless cell where MN might move in the near future. Therefore the context for autonomous services is available in the right place at right time.


Mobile Node Access Router Vertical Handover Fast Handover Location Predictor 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. [1]
    Leelaratne, R., Langley, R.: Multiband PIFA vehicle telematics antennas. Vehicular Technology, IEEE Transactions on, vol. 54, issue 2, March 2005 pp.477–485.CrossRefGoogle Scholar
  2. [2]
    Xio Gao, Gang Wu, Miki, T.: End-to-end QoS provisioning in mobile heterogeneous networks. IEEE Wireless Communications, vol. 11, issue 3, June 2004 pp.24–34.CrossRefGoogle Scholar
  3. [3]
    McNair, J., Fang Zhu: Vertical handovers in fourth-generation multinetwork environments. IEEE Wireless Communications, vol. 11, issue 3, June 2004 pp:8–15.CrossRefGoogle Scholar
  4. [4]
    J. Loughney: Context Transfer Protocol. Seamoby Working Group, Internet Engineering Task Force, draft-ietf-seamoby-ctp-11.txtGoogle Scholar
  5. [5]
    Christos Politis, Kar Ann Chew, Nadeem Akhtar, Michael Georgiades and Rahim Tafazolli: Hybrid Multilayer mobility management with AAA context transfer capabilities for All-IP networks. IEEE Wireless Communications, Aug 2004Google Scholar
  6. [6]
    J. Kempf: Problem Description: Reasons For Performing Context Transfers Between Nodes in an IP Access Network. RFC 3374, Internet Engineering Task Force.Google Scholar
  7. [7]
    Tim Ruckforth, Jan Linder: AAA Context Transfer for Fast Authenticated Interdomain Handover. Swisscom SA, Mar 2004Google Scholar
  8. [8]
    Juan M. Oyoqui, J. Antonio Garcia-Macias: Context transfer for seamless micromobility. IEEE ENC’ 03, 2003Google Scholar
  9. [9]
    Boudewijn R. Haverkort John: Performance of Computer Communication Systems: A Model-Based Approach’, Wiley & Sons, October 1999.Google Scholar
  10. [10]
    Gunter Bolch, Stefan Greiner, Kishor Trevedi: A Generalized Analysis technique for queueing networks with mixed priority strategy and class switching. Technical Report TR-14-95-08, Oct. 1995.Google Scholar
  11. [11]
    OpenSSL, http://www.openssl.orgGoogle Scholar
  12. [12]
    Minsoo Lee, Jintaek Kim, Sehyun Park, Jaeil Lee and Seoklae Lee, “A Secure Web Services for Location Based Services in Wireless Networks,” Lecture Notes in Computer Science, vol. 3042. May 2004, pp. 332–344.CrossRefGoogle Scholar
  13. [13]
    Minsoo Lee, Jintaek Kim, Sehyun Park, Ohyoung Song and Sungik Jun, A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems, Lecture Notes in Computer Science, vol. 3506, May 2005, pp. 394–406.CrossRefGoogle Scholar
  14. [14]
    Minsoo Lee, Gwanyeon Kim, and Sehyun Park: Seamless and Secure Mobility Management with Location Aware Service (LAS) Broker for Future Mobile Interworking Networks, JOURNAL of COMMUNICATIONS and NETWORKS, vol. 7, no. 2, JUNE 2005, pp. 207–221.Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Minsoo Lee
    • 1
  • Gwanyeon Kim
    • 1
  • Sehyun Park
    • 1
  • Ohyoung Song
    • 1
  • Sungik Jun
    • 2
  1. 1.School of Electrical and Electronics EngineeringChung-Ang UniversitySeoulKorea
  2. 2.Electronics and Telecommunications Research InstituteDaejeonKorea

Personalised recommendations