Show simple item record

dc.contributor.authorNyangaresi, Vincent Omollo
dc.date.accessioned2022-06-13T11:50:05Z
dc.date.available2022-06-13T11:50:05Z
dc.date.issued2022-03
dc.identifier.urihttp://ir.jooust.ac.ke:8080/xmlui/handle/123456789/10954
dc.description.abstractThe goal of this thesis was to develop a pseudo-stochastic mobility tracking protocol for secure and high performance handovers in 5G and beyond networks. The research specifically assessed current user equipment mobility prediction models; determined security constraints of the conventional handover techniques; established requirements for a secure and high performance handover; developed a pseudo-stochastic mobility tracking protocol for secure and high performance handovers in 5G and beyond networks; and evaluated the developed protocol. To achieve these objectives, a positivist research philosophy was adopted using a quantitative research approach and simulation strategy. The data for this study included the distance of the user equipment to the base stations, the cell tracking area, number of user equipment within evolved Node B coverage area, call holding time, transmitted power, channel bandwidth, antenna gain, evolved Node B height and latency. These data items were collected using Anaconda simulation tool and their analysis involved the computation of figures of merit such as power density, velocity, received carrier power, traffic intensity, call blocking probability, effective isotropically radiated power and path loss. The results obtained showed that numerous mobility prediction models have been developed but operate on unrealistic assumptions that make them inefficient for real life user mobility predictions within the cellular environment. The results also revealed that the handover process has numerous security constraints owing to vulnerabilities and attacks during this process. In terms of security, the developed protocol implemented strong mutual authentication among the handover entities, elimination of horizontal key derivation, network chaining counter validation, user anonymity, low latency, user un-traceability, and handover parameter ciphering. These strategies rendered this protocol resistant against denial of service, de-synchronization attack, session hijacking, masquerade, network impersonation, disclosure of user identity, horizontal key derivation and tracing attacks. Regarding the developed protocol evaluation, security and performance metrics were deployed. The developed protocol was shown to offer more superior security features than other related protocols. From a performance perspective, comparisons were made with the standard long term evolution handover in which the developed protocol yielded a 130.4%, 27.3% and 130.7% increase in throughput, handover success rate and packet delivery ratio respectively. In addition, it yielded 27.3%, 24.1%, 38.8 % and 56.1% reduction in handover failure rate, ping pong handovers, packet losses, and handover latency respectively.en_US
dc.language.isoenen_US
dc.publisherJOOUSTen_US
dc.subjectPseudo-Stochastic Mobilityen_US
dc.subjectTracking Protocolen_US
dc.subjectHigh Performance Handoversen_US
dc.subject5g Networksen_US
dc.titlePseudo-Stochastic Mobility Tracking Protocol for Secure and High Performance Handovers in 5g and Beyond Networksen_US
dc.typeThesisen_US


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record