{"id":173,"date":"2021-06-02T07:55:51","date_gmt":"2021-06-02T07:55:51","guid":{"rendered":"https:\/\/c3.itec.aau.at\/?p=173"},"modified":"2021-06-02T08:41:03","modified_gmt":"2021-06-02T08:41:03","slug":"paper-accepted-elsevier-computing","status":"publish","type":"post","link":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/","title":{"rendered":"Paper accepted in Springer&#8217;s Journal of Computing"},"content":{"rendered":"\n<p><strong>Title:<\/strong>&nbsp;Handover Authentication Latency Reduction using Mobile Edge Computing and Mobility Patterns<\/p>\n\n\n\n<p><strong>Authors:<\/strong>&nbsp;Fatima Abdullah, Dragi Kimovski, Radu Prodan, and Kashif Munir<\/p>\n\n\n\n<p><strong>Abstract:&nbsp;<\/strong>With the advancement in technology and the exponential growth of mobile devices, network traffic has increased manifold in cellular networks. Due to this reason, latency reduction has become a challenging issue for mobile devices. In order to achieve seamless connectivity and minimal disruption during movement, latency reduction is crucial in the handover authentication process. Handover authentication is a process in which the legitimacy of a mobile node is checked when it crosses the boundary of an access network. This paper proposes an efficient technique that utilizes mobility patterns of the mobile node and mobile Edge computing framework to reduce handover authentication latency. The key idea of the proposed technique is to categorize mobile nodes on the basis of their mobility patterns. We perform simulations to measure the networking latency. Besides, we use queuing model to measure the processing time of an authentication query at an Edge servers. The results show that the proposed approach reduces the handover authentication latency up to 54% in comparison with the existing approach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Title:&nbsp;Handover Authentication Latency Reduction using Mobile Edge Computing and Mobility Patterns Authors:&nbsp;Fatima Abdullah, Dragi Kimovski, Radu Prodan, and Kashif Munir Abstract:&nbsp;With the advancement in technology and the exponential growth of mobile devices, network traffic has increased manifold in cellular networks. Due to this reason, latency reduction has become a challenging issue for mobile devices. In [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-173","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Paper accepted in Springer&#039;s Journal of Computing - C3<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Paper accepted in Springer&#039;s Journal of Computing - C3\" \/>\n<meta property=\"og:description\" content=\"Title:&nbsp;Handover Authentication Latency Reduction using Mobile Edge Computing and Mobility Patterns Authors:&nbsp;Fatima Abdullah, Dragi Kimovski, Radu Prodan, and Kashif Munir Abstract:&nbsp;With the advancement in technology and the exponential growth of mobile devices, network traffic has increased manifold in cellular networks. Due to this reason, latency reduction has become a challenging issue for mobile devices. In [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/\" \/>\n<meta property=\"og:site_name\" content=\"C3\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-02T07:55:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-02T08:41:03+00:00\" \/>\n<meta name=\"author\" content=\"Dragi Kimovski\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dragi Kimovski\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/\"},\"author\":{\"name\":\"Dragi Kimovski\",\"@id\":\"https:\/\/c3.itec.aau.at\/#\/schema\/person\/40f037aaa2d1d20b5a6beb655d80c2ec\"},\"headline\":\"Paper accepted in Springer&#8217;s Journal of Computing\",\"datePublished\":\"2021-06-02T07:55:51+00:00\",\"dateModified\":\"2021-06-02T08:41:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/\"},\"wordCount\":200,\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/\",\"url\":\"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/\",\"name\":\"Paper accepted in Springer's Journal of Computing - C3\",\"isPartOf\":{\"@id\":\"https:\/\/c3.itec.aau.at\/#website\"},\"datePublished\":\"2021-06-02T07:55:51+00:00\",\"dateModified\":\"2021-06-02T08:41:03+00:00\",\"author\":{\"@id\":\"https:\/\/c3.itec.aau.at\/#\/schema\/person\/40f037aaa2d1d20b5a6beb655d80c2ec\"},\"breadcrumb\":{\"@id\":\"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/c3.itec.aau.at\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Paper accepted in Springer&#8217;s Journal of Computing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/c3.itec.aau.at\/#website\",\"url\":\"https:\/\/c3.itec.aau.at\/\",\"name\":\"C3\",\"description\":\"The Carinthian Computing Continuum\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/c3.itec.aau.at\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/c3.itec.aau.at\/#\/schema\/person\/40f037aaa2d1d20b5a6beb655d80c2ec\",\"name\":\"Dragi Kimovski\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/c3.itec.aau.at\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/69f9c67e421b3ea3cb1096163c89fb751722295afb1ef52f18258722953e4d36?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/69f9c67e421b3ea3cb1096163c89fb751722295afb1ef52f18258722953e4d36?s=96&d=mm&r=g\",\"caption\":\"Dragi Kimovski\"},\"url\":\"https:\/\/c3.itec.aau.at\/index.php\/author\/dragi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Paper accepted in Springer's Journal of Computing - C3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/","og_locale":"en_US","og_type":"article","og_title":"Paper accepted in Springer's Journal of Computing - C3","og_description":"Title:&nbsp;Handover Authentication Latency Reduction using Mobile Edge Computing and Mobility Patterns Authors:&nbsp;Fatima Abdullah, Dragi Kimovski, Radu Prodan, and Kashif Munir Abstract:&nbsp;With the advancement in technology and the exponential growth of mobile devices, network traffic has increased manifold in cellular networks. Due to this reason, latency reduction has become a challenging issue for mobile devices. In [&hellip;]","og_url":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/","og_site_name":"C3","article_published_time":"2021-06-02T07:55:51+00:00","article_modified_time":"2021-06-02T08:41:03+00:00","author":"Dragi Kimovski","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dragi Kimovski","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/#article","isPartOf":{"@id":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/"},"author":{"name":"Dragi Kimovski","@id":"https:\/\/c3.itec.aau.at\/#\/schema\/person\/40f037aaa2d1d20b5a6beb655d80c2ec"},"headline":"Paper accepted in Springer&#8217;s Journal of Computing","datePublished":"2021-06-02T07:55:51+00:00","dateModified":"2021-06-02T08:41:03+00:00","mainEntityOfPage":{"@id":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/"},"wordCount":200,"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/","url":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/","name":"Paper accepted in Springer's Journal of Computing - C3","isPartOf":{"@id":"https:\/\/c3.itec.aau.at\/#website"},"datePublished":"2021-06-02T07:55:51+00:00","dateModified":"2021-06-02T08:41:03+00:00","author":{"@id":"https:\/\/c3.itec.aau.at\/#\/schema\/person\/40f037aaa2d1d20b5a6beb655d80c2ec"},"breadcrumb":{"@id":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-elsevier-computing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/c3.itec.aau.at\/"},{"@type":"ListItem","position":2,"name":"Paper accepted in Springer&#8217;s Journal of Computing"}]},{"@type":"WebSite","@id":"https:\/\/c3.itec.aau.at\/#website","url":"https:\/\/c3.itec.aau.at\/","name":"C3","description":"The Carinthian Computing Continuum","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/c3.itec.aau.at\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/c3.itec.aau.at\/#\/schema\/person\/40f037aaa2d1d20b5a6beb655d80c2ec","name":"Dragi Kimovski","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/c3.itec.aau.at\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/69f9c67e421b3ea3cb1096163c89fb751722295afb1ef52f18258722953e4d36?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69f9c67e421b3ea3cb1096163c89fb751722295afb1ef52f18258722953e4d36?s=96&d=mm&r=g","caption":"Dragi Kimovski"},"url":"https:\/\/c3.itec.aau.at\/index.php\/author\/dragi\/"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"amoteam-general":false,"1536x1536":false,"2048x2048":false,"sydney-large-thumb":false,"sydney-medium-thumb":false,"sydney-small-thumb":false,"sydney-service-thumb":false,"sydney-mas-thumb":false},"uagb_author_info":{"display_name":"Dragi Kimovski","author_link":"https:\/\/c3.itec.aau.at\/index.php\/author\/dragi\/"},"uagb_comment_info":0,"uagb_excerpt":"Title:&nbsp;Handover Authentication Latency Reduction using Mobile Edge Computing and Mobility Patterns Authors:&nbsp;Fatima Abdullah, Dragi Kimovski, Radu Prodan, and Kashif Munir Abstract:&nbsp;With the advancement in technology and the exponential growth of mobile devices, network traffic has increased manifold in cellular networks. Due to this reason, latency reduction has become a challenging issue for mobile devices. In&hellip;","_links":{"self":[{"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/posts\/173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/comments?post=173"}],"version-history":[{"count":4,"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/posts\/173\/revisions"}],"predecessor-version":[{"id":177,"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/posts\/173\/revisions\/177"}],"wp:attachment":[{"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/media?parent=173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/categories?post=173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/tags?post=173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}