scispace - formally typeset
Search or ask a question
Topic

Handover

About: Handover is a research topic. Over the lifetime, 24219 publications have been published within this topic receiving 296416 citations. The topic is also known as: handoff.


Papers
More filters
Patent
30 Apr 2007
TL;DR: In this article, a method and apparatus for facilitating lossless handover in a wireless communication system comprising at least one wireless transmit/receive unit (WTRU), a source evolved Node B (eNB), a target eNB, and a mobility management entity/user plane entity (MME/UPE) where the WTRU is in wireless communication with the source eNB is presented.
Abstract: The present invention is related to a method and apparatus for facilitating lossless handover in a wireless communication system comprising at least one wireless transmit/receive unit (WTRU), a source evolved Node B (eNB), a target eNB, and a mobility management entity/user plane entity (MME/UPE) where the WTRU is in wireless communication with the source eNB. The source eNB determines to handover the WTRU to the target eNB, requests status reports from the WTRU, and requests handover to the target eNB. The handover request includes context information relating to the WTRU which is sent to the target eNB. The target eNB configures resources for the WTRU and transmits a handover response signal to the source eNB. The source eNB commands the WTRU to perform a handover to the target eNB and forwards data to the target eNB. The WTRU performs the handover to the target eNB.

82 citations

Patent
08 May 2006
TL;DR: In this article, a multi-mode mobile station includes a first interface for wireless communication with a wireless local area network (WLAN) and a second interface for WLAN/WWAN communication.
Abstract: A multi-mode mobile station includes a first interface for wireless communication with a wireless local area network (WLAN) and a second interface for wireless communication with a wireless wide area network (WWAN). The multi-mode mobile station is associated with a particular conference bridge, through which all calls to and from the multi-mode mobile station are routed. For example, when a call involving the multi-mode mobile is established via the WLAN, the call includes a WLAN call leg that extends from the conference bridge to the multi-mode mobile station via the WLAN. To effect a handoff during the call, a WWAN call leg is established between the multi-mode mobile station and the conference bridge via the WWAN. The conference bridge bridges the WLAN and WWAN call legs. To complete the handoff, the multi-mode mobile station drops the WLAN call leg and continues the call using the WWAN call leg.

82 citations

Patent
09 Sep 1993
TL;DR: In this paper, a handoff measurement priority system was proposed for selecting the best handoff candidate cell at times when the number of neighboring cells that meet the measurement criteria is greater than twelve a measurement list is generated.
Abstract: A method and system for selecting the best handoff candidate cell at times when the number of neighboring cells that meet the measurement criteria is greater than twelve a measurement list is generated. The cells are assigned a handoff measurement priority wherein a handoff priority of zero is assigned to 12-N cells where N is between 1 and 6. A priority of 8 is assigned to the worst N cells. A new measurement list is generated using the 12-N cells and other unreported cells having a higher priority than the N worst cells.

82 citations

Patent
21 Feb 1997
TL;DR: In this article, the authors used markers that are located at fixed locations in the ATM cell stream in order to indicate the ending of an uplink and downlink cell stream, so that the switching of cell streams can be carried out in a synchronised fashion, and cells are not lost and their relative order does not change.
Abstract: In the handover of a radio extension of an ATM network there are used markers that are located at fixed locations in the ATM cell stream in order to indicate the ending of an uplink and downlink cell stream, so that the switching of cell streams can be carried out in a synchronised fashion, and cells are not lost and their relative order does not change. If a downlink data transmission via the old access point succeeds, the old access point attaches to the last forwarded information field a notice of closing the traffic, in which case the mobile terminal transfers the information of successful transmission to the new access point. In another case, the old access point sends the unforwarded cells to the new access point and terminates the transaction with the same marker that generally indicates the end of a downlink cell stream.

81 citations

Journal ArticleDOI
TL;DR: Comprehensive performance evaluation and comparisons show that RUSH outperforms other schemes in both computation and communication efficiencies, and formal security proofs indicate that RRush resists various attacks.
Abstract: The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous and backward-compatible networks. With the increased heterogeneity and densification of 5G heterogeneous networks (HetNets), it is important to ensure security and efficiency of frequent handovers in 5G wireless roaming environments. However, existing handover authentication mechanisms still have challenging issues, such as anonymity, robust traceability and universality. In this paper, we address these issues by introducing RUSH, a Robust and Universal Seamless Handover authentication protocol for 5G HetNets. In RUSH, anonymous mutual authentication with key agreement is enabled for handovers by exploiting the trapdoor collision property of chameleon hash functions and the tamper-resistance of blockchains. RUSH achieves universal handover authentication for all the diverse mobility scenarios, as exemplified by the handover between 5G new radio and non-3GPP access regardless of the trustworthiness of non-3GPP access and the consistency of the core network. RUSH also achieves perfect forward secrecy, master key forward secrecy, known randomness secrecy, key escrow freeness and robust traceability. Our formal security proofs based on the BAN-logic and formal verification based on AVISPA indicate that RUSH resists various attacks. Comprehensive performance evaluation and comparisons show that RUSH outperforms other schemes in both computation and communication efficiencies.

81 citations


Network Information
Related Topics (5)
Wireless network
122.5K papers, 2.1M citations
88% related
Wireless
133.4K papers, 1.9M citations
88% related
Wireless ad hoc network
49K papers, 1.1M citations
86% related
Network packet
159.7K papers, 2.2M citations
85% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023338
2022759
2021511
2020816
2019824
2018865