Secure Mobility Protocols for Cross-Network Wireless Handoffs
Dr. Srabana PramanikAsisstant Professor, Department of Computer Science Engineering, Presidency University, Bangaluru, Karnataka srabana.pramanik@presidencyuniversity.in0000-0001-6108-631X
Charu School of Engineering & Computing, Dev Bhoomi Uttarakhand University, Dehradun ee.charu@dbuu.ac.in0000-0002-0950-7241
Siddharth SriramCentre of Research Impact and Outcome, Chitkara University, Rajpura, Punjab siddharth.sriram.orp@chitkara.edu.in0009-0009-8776-1390
R. PachayappanAssistant Professor, Department of Computer Applications (DCA), Presidency College, Bengaluru, Karnataka pachayappan@presidency.edu.in0009-0007-9348-9560
Ranganathaswamy Madihalli KenchappaAssociate Professor, Department of Mechanical Engineering, Faculty of Engineering and Technology, JAIN (Deemed-to-be University), Karnataka mk.ranganatha@jainuniversity.ac.in0000-0001-7387-839X
Dr. Prabhat Kumar SahuAssociate Professor, Department of Computer Science and Information Technology, Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, Odisha prabhatsahu@soa.ac.in0000-0002-0460-9783
Today, mobile phones and other portable devices switch between Wi-Fi, cellular, and even 5G networks. Not only mobile networks, but other networks need to switch as well. While these transitions help to keep services running smoothly, they are usually the endpoints for malicious activities conducted by cyber criminals. This document looks into the dangers of the security gaps cross-network wireless transitions create and proposes a framework that aims to secure transitions of mobile devices between networks with minimal impact on latency and throughput. Our model combines context-aware authentication with predictive mobility to model trust channel setups for anticipated handoff events. Using model-based simulations and real-world testbed experiments, the designed protocol achieved lower authentication delays and packet loss when compared to baseline models. In addition, the protocol showed that it was able to defend against many mobility-based attacks such as session hijacking and rogue AP infiltration. The results demonstrate that in this era of mobile computing, adaptive mobility protocols need to be implemented for the devices to ensure that the data information and user’s privacy is kept safe.