Security evaluation of cellular networks handover techniques

@article{Nyangaresi2018SecurityEO,
  title={Security evaluation of cellular networks handover techniques},
  author={Vincent O. Nyangaresi and Silvance O. Abeka and Anthony Rodgrigues},
  journal={International Journal of Computer Network and Information Security},
  year={2018},
  volume={10},
  pages={45-59}
}
This paper examined the handovers in cellular networks from both functional and informational security point of view. The aim was to find out if the security goals of confidentiality, integrity and availability (CIA) are preserved during handovers. Whereas functional security is concerned with the proper operation of the handover procedures, informational security deals with confidentiality and integrity of the handover process. The global system for mobile communication provides data and voice… Expand
2 Citations

References

SHOWING 1-10 OF 29 REFERENCES
Various Handover Management Techniques In GSM Cellular System
A Review: Handover in 3G/UMTS Network
An Enhanced Handover Scheme for Mobile Relays in LTE-A High-Speed Rail Networks
STUDY OF SOFT HANDOVER IN THIRD GENERATION CELLULAR NETWORK
Challenges and Solutions for Handoff Issues in 4G Wireless Systems An Overview
A handover technique for inter- and intra- domain proxy mobile IPv6 in vehicular network environment
Analysing GSM Insecurity
...
1
2
3
...