Your browser does not support JavaScript!

Fast handoff scheme based on mobility prediction in public wireless LAN systems

Fast handoff scheme based on mobility prediction in public wireless LAN systems

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IEE Proceedings - Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Recently, wireless LAN systems have been widely deployed for public mobile Internet services. Public wireless LAN systems can provide high speed Internet connectivity using portable devices such as laptop computers, personal digital assistants (PDAs), etc. In public wireless LAN systems, reliable user authentication and mobility support are essential issues. However, re-authentication during handoff procedures causes long handoff latency and this affects the quality of service in real-time multimedia applications. A fast handoff scheme based on mobility prediction is proposed. In this scheme, a mobile host entering the area covered by an access point (AP) performs authentication procedures for multiple APs, rather than just the current AP. These multiple APs are selected by a prediction method called the frequent handoff region (FHR) selection algorithm, which takes into account users' mobility patterns, service classes, etc. Since a mobile host is registered and authenticated for an FHR in advance, handoff latency resulting from re-authentication can be significantly reduced. Simulation results show that the proposed scheme is more efficient than other schemes in terms of handoff delay and buffer requirements.


    1. 1)
      • A. Campbell , J. Gomez . IP micro-mobility protocols. ACM Mob. Comput. Commun. Rev. , 4
    2. 2)
      • A. Mishra , M. Shin , W. Arbaugh . An empirical analysis of the IEEE 802.11 MAC layer handoff process. Comput. Commun. Rev. , 2
    3. 3)
      • W. Soh , H. Kim . QoS provisioning in cellular networks based on mobility prediction techniques. IEEE Commun. Mag. , 86 - 92
    4. 4)
      • `General characteristics of international telephone connections and international telephone circuits', ITU-TG.114, 1998.
    5. 5)
      • Rigney, C., Willens, S., Rubens, A., Simpson, W.: `Remote authentication dial in user service (RADIUS)', IETF RFC 2865, June 2000.
    6. 6)
      • Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: `Diameter base protocol', IETF RFC 3588, September 2003.
    7. 7)
      • Velayos, H., Karlsson, G.: `Techniques to reduce IEEE 802.11b MAC layer handover time', TRITA-IMIT-LCN R 03:02, KTH technical report, 2003.
    8. 8)
      • Aboba, B.: `IEEE 802.1X pre-authentication preauthentication', IEEE 802.11 TGi draft, June 2002.
    9. 9)
      • Schwab, D., Bunt, R.: `Characterising the use of a campus wireless network', Proc. IEEE INFOCOM, March 2004, Hong Kong.
    10. 10)
      • `IEEE standards for local and metropolitan area networks: port based network access control', IEEE Std 802.1x-2001, June 2001.
    11. 11)
      • Bettstetter, C.: `Smooth is better than sharp: a random mobility model for simulation of wireless networks', Proc. ACM MSWiM 2001, July 2001, Rome, Italy.
    12. 12)
      • Mitton, D., Johns, M., Barkley, S., Nelson, D., Patil, B., Stevens, M., Wolff, B.: `Authentication, authorization, and accounting: protocol evaluation', IETF RFC 3127, June 2001.
    13. 13)
      • Balachandran, A., Voelker, G., Bahl, P., Rangan, P.: `Characterizing user behaviour and network performance in a public wireless LAN', Proc. ACM SIGMETRIC, June 2002, Los Angeles, CA, USA, p. 195–205.

Related content

This is a required field
Please enter a valid email address