A FAHP Weighting Scheme for System Attributes in Heterogeneous Wireless Networks

نویسندگان

  • Faisal Kaleem
  • Abolfazl Mehbodniya
  • Kang K. Yen
  • Fumiyuki Adachi
چکیده

In a heterogeneous wireless network, different wireless access technologies with different operating parameters coexists in an overlay fashion. These wireless networks are deployed in order to provide different type of services to Mobile Stations (MSs) equipped with multiple interfaces, based on the principle of Always Best Connected (ABC) network. In such a dynamic environment, an MS can seamlessly switch from one wireless Access Network (AN) to another to guarantee continuity and quality of the current session. This is where the need for intelligent and efficient Vertical Handoffs (VHOs) between technologies in a heterogeneous wireless environment becomes apparent. This paper presents the design and the detailed calculations of a novel weighting mechanism for the system attributes in heterogeneous wireless networks with applications to VHO. A Fuzzy based Analytic Hierarchy Process (FAHP) is used to calculate the weights, due to its capability to handle inherent uncertainty and vagueness which is present in the subjective preference evaluations of end-users. The mechanism is designed for four different traffic classes and takes into account the Quality of Service (QoS) requirements for each class. Keywords—fuzzy logic; handoffs; MADM; heterogeneous wireless networks; Fuzzy Analytic Hierarchy Process;

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Performance Analysis of Wireless Cooperative Networks with Iterative Incremental Relay Selection

In this paper, an iterative incremental relay selection (IIRS) scheme is considered for wireless cooperative networks in order to increase the reliability of transmission. Different from the conventional incremental relay selection which incrementally selects a best relay for only one iteration; the IIRS scheme iteratively applies the incremental relaying and relay selection processes. To evalu...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012