Performance modeling of Pre-authentication and handoff mechanisms in IEEE 802.11 based vehicular networks

The increase in multimedia usage places stringent requirements on wireless network performance in terms of lesser handoff delays. A VOIP client, for example, cannot tolerate a delay larger than 150 ms between the incoming voice packets to ensure a satisfactory interactive service to the user. Of the 150ms, only 50ms is allowed for handoff and the rest should accommodate the transmission delay of the packet over the Internet. Unfortunately, the handoff delay itself in case of robust authentication mechanisms like IEEE 802.1x is so large that the time spent in handoff is more than the time the mobile client remains connected to the Access Point. Pre-authentication therefore is a viable alternative though it causes a considerable increase in the network overload owing to the increase in the number of service requests and thence in the network queue sizes. It becomes imperative to evaluate the network performance in order to know the relevance and advantages of pre-authentication to minimize handoff delay. We study the effect of network overload on handoff delay. Subsequently, we modeled a network in which a mobile VOIP client communicates with the other via a network cloud comprising the access points and authentication servers.

[1]  Hyunsoo Yoon,et al.  An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks , 2007, IWSEC.

[2]  Yanghee Choi,et al.  SNC , 2005, ACM SIGMOBILE Mob. Comput. Commun. Rev..

[3]  Yanghee Choi,et al.  Fast handoff scheme based on mobility prediction in public wireless LAN systems , 2004 .

[4]  Gert Willems,et al.  Performance Evaluation of Layer 3 Low Latency Handoff Mechanisms , 2004, Mob. Networks Appl..

[5]  Yanghee Choi,et al.  A selective neighbor caching scheme for fast handoff in IEEE 802.11 wireless networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[6]  Anand R. Prasad,et al.  Fast authentication methods for handovers between IEEE 802.11 wireless LANs , 2004, WMASH '04.

[7]  William A. Arbaugh,et al.  Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.

[8]  Terry Williams,et al.  Probability and Statistics with Reliability, Queueing and Computer Science Applications , 1983 .

[9]  Kishor S. Trivedi Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .

[10]  Sanaa Sharafeddine,et al.  On traffic characteristics and bandwidth requirements of voice over IP applications , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[11]  Yongqiang Liu,et al.  LeapFrog: Fast, Timely WiFi Handoff , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[12]  Hyun-Ho Choi,et al.  Seamless Handoff Scheme Based on Pre-registration and Pre-authentication for UMTS–WLAN Interworking , 2007, Wirel. Pers. Commun..

[13]  Antonio F. Gómez-Skarmeta,et al.  Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).