Skip to main content

MIH-Based eNB Selection for Untrusted Networks

  • Conference paper
  • First Online:

Abstract

In recent years, some mobile phones are equipped with more than one Radio Access Technology (RAT) to make themselves adapt to a heterogeneous environment which comprises networks of different technologies. Also, during a User Equipment’s (UE’s) handover, it would be better if we can choose a suitable eNB as the next eNB (NeNB) to serve this UE. Generally, this can be achieved with the help of Common Radio Resource Management (CRRM). In this study, we propose a NeNB selection scheme, called eNB Selection System (eSeS), for two adjacent networks, e.g., Q and R, to select an appropriate eNB in R for UE before UE hands over from Q, i.e., source network, to R, i.e., target network. In order to enable the communication between different types of RATs, such as Long Term Evolution Advanced (LTE-A) and Wireless Local Area Network (WLAN), we utilize the IEEE 802.21 Media Independent Handover (MIH) as their common data exchange mechanism. With the CRRM, the load balance in a heterogeneous network environment can also be maintained. In our simulation, the performance of this scheme in untrusted network handover cases is better than that of PMIPv6 and FMIPv6.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Leung, K.: WiMAX Forum/ 3GPP2 proxy mobile IPv4, IEFT RFC 5563. https://tools.ietf.org/html/rfc5563 (2010). Accessed 15 Jan 2018

  2. Stanley, D.: Control and provisioning of wireless access points (CAPWAP) protocol binding for IEEE 802.11, IETF RFC 5416. https://tools.ietf.org/html/rfc5416 (2009). Accessed 27 Aug 2018

  3. Xia, F.: DHCPv6 prefix delegation in long-term evolution (LTE) networks, IETF RFC 6653. https://tools.ietf.org/html/rfc6653 (2012). Accessed 10 Aug 2018

  4. Begerow, P., Krug, S., Rubaye, A.A., Renhak, K., Seitz, J.: Delay tolerant handover for heterogeneous networks. In: 39th Annual IEEE Conference on Local Computer Networks, pp. 370–373 (2014)

    Google Scholar 

  5. IEEE Standard for Local and metropolitan area networks.: Part 21: Media independent handover services. http://ieeexplore.ieee.org/document/4769367/ (2009). Accessed 04 Aug 2018

  6. Mzoughi, H., Zarai, F., Kamoun, L.: Interference—Limited radio resources allocation in LTE_A system with MIH cooperation. In: The Asia-Pacific Conference on Communications (APCC), pp. 174–179 (2016)

    Google Scholar 

  7. Wang, G., Chen, L.: Performance comparison between utility based and MIH schemes in vertical handover. In: The 9th IEEE Conference on Industrial Electronics and Applications, pp. 203–207 (2014)

    Google Scholar 

  8. Kim, P.S., Jang, M.S., Lee, E.H.: An IEEE 802.21 MIH functionality assisted proxy mobile IPv6 for reducing handover latency and signaling cost. In: 2013 10th International Conference on Information Technology: New Generations, pp. 692–695 (2013)

    Google Scholar 

  9. Chiu, D.M., Jain, R.: Analysis of the increase and decrease algorithms for congestion avoidance in computer networks. Comput. Netw. ISDN Syst. 17(1), 1–14 (1989)

    Article  Google Scholar 

  10. Wu, L., Sandrasegaran, K.: A survey on common radio resource management. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (2007)

    Google Scholar 

  11. Houda, M., Zarai, F., Obaidat, M.S., Kamoun, L.: Optimizing handover decision and target selection in LTE-A network-based on MIH protocol. In: IEEE International Conference on Communications, pp. 299–304 (2014)

    Google Scholar 

  12. Leu, F.Y., Cheng, C.C.: MIH-based Congestion control with seamless handover in untrusted heterogeneous networks. In: The 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2017), pp. 502–510 (2017)

    Google Scholar 

  13. Mussabbir, Q.B., Yao, W., Niu, Z., Fu, X.: Optimized FMIPv6 using IEEE 802.21 MIH services in vehicular networks. IEEE Trans. Veh. Technol. 56(6), 3397–3407 (2007)

    Article  Google Scholar 

  14. Ha, J., Kim, J.Y., Kim, J.U., Kim, S.H.: Dynamic load balancing architecture in heterogeneous wireless network environment. In: The 9th International Symposium on Communications and Information Technology (ISCIT 2009), pp. 248–253 (2009)

    Google Scholar 

  15. Wang, Y., Yuan, J., Zhou, Y., Li, G., Liu, F., Zhang, P.: Handover management in enhanced MIH framework for heterogeneous wireless networks environment. Wirel. Pers. Commun. 52(3), 615–636 (2010)

    Article  Google Scholar 

  16. Buiati, F., Villalba, L.J.G., Corujo, D., Sargento, S., Aguiar, R.L.: IEEE 802.21 information services deployment for heterogeneous mobile environments. IET Commun. 5(18), 2721–2729 (2011)

    Article  Google Scholar 

  17. Koodli, R.: Mobile IPv6 fast handovers, IETF RFC 5568. https://tools.ietf.org/html/rfc5568 (2009). Accessed 09 Aug 2018

  18. Devarapalli, V.: Proxy Mobile IPv6, IETF RFC 5213. https://tools.ietf.org/html/rfc5213 (2008). Accessed 09 Mar 2018

  19. Seamless and secure mobility. https://www.nist.gov/publications/seamless-and-secure-mobility. Accessed 17 Mar 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fang-Yie Leu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Leu, FY., Tsai, KL., Hung, RT. (2019). MIH-Based eNB Selection for Untrusted Networks. In: Chen, JL., Pang, AC., Deng, DJ., Lin, CC. (eds) Wireless Internet. WICON 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 264. Springer, Cham. https://doi.org/10.1007/978-3-030-06158-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-06158-6_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-06157-9

  • Online ISBN: 978-3-030-06158-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics