Abstract
The offloading techniques have become more prominent among the mobile computing due to the increased number of users and enormous amount of information flowing through the internet. The offloading techniques enhance the competence of the mobile computing by reducing the congestion in the network caused by increased number of users and the enormous data traffic experienced. However in many cases the authentication becomes very essential for the connection establishment. So the paper proposes a secure and cost efficient data offloading technique for the mobile computing to make it safe, secure with an effective management of network traffic. The performance analysis of the security measures proffered in the paper for authentication of the offloading techniques in terms of the security, cost and the delay in the offloading ensures that the proposed method is superior to the existing methods.
Publisher
Inventive Research Organization
Reference15 articles.
1. [1] Srinivasan, Devaraj, Jayanta Dey, S. M. Kumar, and Romendra Nath Mukherjee. "Data Offload approaches for Mobile operators-Improving Network Efficiency and Strengthening quality of service." Wipro Council for Industry Research (2012).
2. [2] Hinger, Deepshikha, and Dhananjay Kalbande. "Review of mobile data offloading through Wi-Fi." In 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA), pp. 425-429. IEEE, 2014.
3. [3] Aijaz, Adnan, Hamid Aghvami, and Mojdeh Amani. "A survey on mobile data offloading: technical and business perspectives." IEEE Wireless Communications 20, no. 2 (2013): 104-112.
4. [4] Pawar, Ashwini R., S. S. Bhardwaj, and Sachin N. Wandre. "Mobile data offloading techniques and related issues." International Journal of Advanced Research in Computer Engineering & Tech.(IJARCET) 4 (2015): 1367-1371.
5. [5] Rebecchi, Filippo, Marcelo Dias De Amorim, Vania Conan, Andrea Passarella, Raffaele Bruno, and Marco Conti. "Data offloading techniques in cellular networks: A survey." IEEE Communications Surveys & Tutorials 17, no. 2 (2014): 580-603.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献