{"id":"https://openalex.org/W3197017567","doi":"https://doi.org/10.1109/blackseacom52164.2021.9527825","title":"An Efficient and Secure Handover Mechanism for SDN-Enabled 5G HetNet","display_name":"An Efficient and Secure Handover Mechanism for SDN-Enabled 5G HetNet","publication_year":2021,"publication_date":"2021-05-24","ids":{"openalex":"https://openalex.org/W3197017567","doi":"https://doi.org/10.1109/blackseacom52164.2021.9527825","mag":"3197017567"},"language":"en","primary_location":{"id":"doi:10.1109/blackseacom52164.2021.9527825","is_oa":false,"landing_page_url":"https://doi.org/10.1109/blackseacom52164.2021.9527825","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025280338","display_name":"Shaikhum Monira","orcid":null},"institutions":[{"id":"https://openalex.org/I205746353","display_name":"University of Dhaka","ror":"https://ror.org/05wv2vq37","country_code":"BD","type":"education","lineage":["https://openalex.org/I205746353"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Shaikhum Monira","raw_affiliation_strings":["University of Dhaka, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"University of Dhaka, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I205746353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072292317","display_name":"Upama Kabir","orcid":null},"institutions":[{"id":"https://openalex.org/I205746353","display_name":"University of Dhaka","ror":"https://ror.org/05wv2vq37","country_code":"BD","type":"education","lineage":["https://openalex.org/I205746353"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Upama Kabir","raw_affiliation_strings":["University of Dhaka, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"University of Dhaka, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I205746353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081364889","display_name":"Mosarrat Jahan","orcid":"https://orcid.org/0000-0001-8834-0242"},"institutions":[{"id":"https://openalex.org/I205746353","display_name":"University of Dhaka","ror":"https://ror.org/05wv2vq37","country_code":"BD","type":"education","lineage":["https://openalex.org/I205746353"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Mosarrat Jahan","raw_affiliation_strings":["University of Dhaka, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"University of Dhaka, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I205746353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039730579","display_name":"Uchswas Paul","orcid":null},"institutions":[{"id":"https://openalex.org/I142758973","display_name":"University of Information Technology and Sciences","ror":"https://ror.org/04j1jjs80","country_code":"BD","type":"education","lineage":["https://openalex.org/I142758973"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Uchswas Paul","raw_affiliation_strings":["University of Information Technology and Sciences, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"University of Information Technology and Sciences, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I142758973"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025280338"],"corresponding_institution_ids":["https://openalex.org/I205746353"],"apc_list":null,"apc_paid":null,"fwci":0.2005,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.50800618,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/heterogeneous-network","display_name":"Heterogeneous network","score":0.855163037776947},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7757229804992676},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.7741990089416504},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7016355991363525},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4968753159046173},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.47078436613082886},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4480562210083008},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.338165283203125},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.15282124280929565},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.14930641651153564},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14330577850341797},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12680596113204956}],"concepts":[{"id":"https://openalex.org/C158207573","wikidata":"https://www.wikidata.org/wiki/Q5747224","display_name":"Heterogeneous network","level":4,"score":0.855163037776947},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7757229804992676},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.7741990089416504},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7016355991363525},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4968753159046173},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.47078436613082886},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4480562210083008},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.338165283203125},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.15282124280929565},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.14930641651153564},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14330577850341797},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12680596113204956},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/blackseacom52164.2021.9527825","is_oa":false,"landing_page_url":"https://doi.org/10.1109/blackseacom52164.2021.9527825","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W174317439","https://openalex.org/W1480384237","https://openalex.org/W1529012707","https://openalex.org/W2029090942","https://openalex.org/W2116876232","https://openalex.org/W2472333518","https://openalex.org/W2741901456","https://openalex.org/W2765869636","https://openalex.org/W2902632384","https://openalex.org/W2949482340","https://openalex.org/W2955611229","https://openalex.org/W3013887189","https://openalex.org/W3033637208","https://openalex.org/W3042324215","https://openalex.org/W4298051233"],"related_works":["https://openalex.org/W1970565692","https://openalex.org/W2472244225","https://openalex.org/W1980116404","https://openalex.org/W2375838235","https://openalex.org/W2032131730","https://openalex.org/W2068674015","https://openalex.org/W2294596412","https://openalex.org/W4249439626","https://openalex.org/W2182980720","https://openalex.org/W2902414365"],"abstract_inverted_index":{"New":[0],"5G":[1,36,69,89],"technology":[2],"enables":[3],"network":[4],"connectivity":[5],"for":[6],"innumerable":[7],"IoT,":[8],"mobile,":[9],"and":[10,31,46,80,100,119,152,156,162],"sensor":[11],"devices.":[12],"This":[13,74],"massive":[14],"involvement":[15],"of":[16,61,68,132],"tremendous":[17],"devices":[18,45],"with":[19],"diverse":[20],"architectures":[21],"creates":[22],"a":[23],"complete":[24,59],"Heterogeneous":[25],"Network":[26],"(HetNet)":[27],"within":[28],"5G.":[29],"Efficient":[30],"secure":[32],"handover":[33,63,82,144],"management":[34],"in":[35,88,160],"HetNet":[37],"is":[38,71],"immensely":[39],"challenging":[40],"due":[41],"to":[42,54,84,167],"the":[43,58,62,66,95,112,129,133,168],"connected":[44],"cell":[47],"structures\u2019":[48],"diversity.":[49],"Although":[50],"some":[51],"researches":[52],"attempt":[53],"address":[55],"this":[56],"issue,":[57],"design":[60],"process,":[64],"considering":[65],"diversity":[67],"HetNet,":[70],"still":[72],"missing.":[73],"paper":[75],"introduces":[76],"an":[77],"SDN-enabled":[78],"unified":[79],"efficient":[81],"scheme":[83,93,107,142],"ensure":[85],"seamless":[86],"mobility":[87],"HetNet.":[90],"The":[91],"proposed":[92,134],"expedites":[94],"performance":[96],"through":[97,111,123,149],"idle":[98,150],"scanning":[99,151],"supports":[101],"Device-to-Device":[102],"(D2D)":[103],"communication.":[104],"Besides,":[105],"our":[106,141],"ensures":[108],"data":[109],"privacy":[110],"Elliptic":[113],"Curve":[114],"Integrated":[115],"Encryption":[116],"Scheme":[117],"(ECIES)":[118],"prevents":[120],"illegal":[121],"access":[122],"device":[124],"authentication.":[125],"Security":[126],"analysis":[127],"endorses":[128],"security":[130],"properties":[131],"scheme.":[135],"Moreover,":[136],"experimental":[137],"results":[138],"reveal":[139],"that":[140],"reduces":[143],"delay":[145],"by":[146],"nearly":[147],"50%":[148],"achieves":[153],"approximately":[154],"25%":[155],"43%":[157],"communication":[158],"reduction":[159],"intra-domain":[161],"inter-domain":[163],"handover,":[164],"respectively,":[165],"compared":[166],"existing":[169],"work.":[170]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
