| Citation: | MA Bin, CHEN Xin, XIE Xianzhong, ZHONG Shilin. Vertical Handover Algorithm Considering Terminal Security and Resource Scheduling[J]. Journal of Electronics & Information Technology, 2022, 44(8): 2792-2801. doi: 10.11999/JEIT210450 | 
 
	                | [1] | FANG Dongfeng, QIAN Yi, and HU R Q. Security for 5G mobile wireless networks[J]. IEEE Access, 2017, 6: 4850–4874. doi:  10.1109/ACCESS.2017.2779146 | 
| [2] | LALROPUIA K C and GUPTA V. A Bayesian game model and network availability model for small cells under Denial of Service (DoS) attack in 5G wireless communication network[J]. Wireless Networks, 2020, 26: 557–572. doi:  10.1007/s11276-019-02163-8 | 
| [3] | JAVED M A and NIAZI S K. 5G security artifacts (DoS / DDoS and authentication)[C]. 2019 International Conference on Communication Technologies (ComTech), Rawalpindi, Pakistan, 2019: 127–133. | 
| [4] | LIANG Gen, SUN Guoxi, FANG Jingcheng, et al. An access selection algorithm for heterogeneous wireless networks based on optimal resource allocation[J]. Wireless Communications and Mobile Computing, 2020, 2020: 8844015. doi:  10.1155/2020/8844015 | 
| [5] | LIU Luning, WANG Luhan, and WEN Xiangming. Joint network selection and traffic allocation in multi-access edge computing-based vehicular crowdsensing[C]. IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, Canada, 2020: 1184–1189. | 
| [6] | TAN Xiaonan, CHEN Geng, and SUN Hongyu. Vertical handover algorithm based on multi-attribute and neural network in heterogeneous integrated network[J]. EURASIP Journal on Wireless Communications and Networking, 2020, 2020: 202. doi:  10.1186/s13638-020-01822-1 | 
| [7] | WANG Shumin, DENG Honggui, XIONG Rujing, et al. A multi-objective model-based vertical handoff algorithm for heterogeneous wireless networks[J]. EURASIP Journal on Wireless Communications and Networking, 2021, 2021: 75. doi:  10.1186/s13638-021-01952-0 | 
| [8] | 马彬, 张文静, 谢显中. 面向终端个性化服务的模糊垂直切换算法[J]. 电子与信息学报, 2017, 39(6): 1284–1290. doi:  10.11999/JEIT160839 MA Bin, ZHANG Wenjing, and XIE Xianzhong. Individualization service oriented fuzzy vertical handover algorithm[J]. Journal of Electronics &Information Technology, 2017, 39(6): 1284–1290. doi:  10.11999/JEIT160839 | 
| [9] | OZHELVACI A and MA Maode. Secure and efficient vertical handover authentication for 5G HetNets[C]. 2018 IEEE International Conference on Information Communication and Signal Processing (ICICSP), Singapore, 2018: 27–32. | 
| [10] | CAO Wei, MA Nan, and ZHANG Ping. Security analysis of DoS attack against the LTE-A system[C]. 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, 2017: 1287–1292. | 
| [11] | YENGI Y, KAVAK A, and ARSLAN H. Physical layer detection of malicious relays in LTE-A network using unsupervised learning[J]. IEEE Access, 2020, 8: 154713–154726. doi:  10.1109/ACCESS.2020.3017045 | 
| [12] | FANG Liming, ZHAO Bo, LI Yang, et al. Countermeasure based on smart contracts and AI against DoS/DDoS attack in 5G circumstances[J]. IEEE Network, 2020, 34(6): 54–61. doi:  10.1109/MNET.021.1900614 | 
| [13] | HU Xinxin, LIU Caixia, LIU Shuxin, et al. A systematic analysis method for 5G non-access stratum signalling security[J]. IEEE Access, 2019, 7: 125424–125441. doi:  10.1109/ACCESS.2019.2937997 | 
| [14] | LIU Chibiao and QIU Jinming. Performance study of 802.11w for preventing DoS attacks on wireless local area networks[J]. Wireless Personal Communications, 2017, 95(2): 1031–1053. doi:  10.1007/s11277-016-3812-9 | 
| [15] | YE Ayong, LI Qing, ZHANG Qiang, et al. Detection of spoofing attacks in WLAN-based positioning systems using WiFi hotspot tags[J]. IEEE Access, 2020, 8: 39768–39780. doi:  10.1109/ACCESS.2020.2976189 | 
| [16] | JOVER R P and MAROJEVIC V. Security and protocol exploit analysis of the 5G specifications[J]. IEEE Access, 2019, 7: 24956–24963. doi:  10.1109/ACCESS.2019.2899254v | 
| [17] | KULSHRESTHA S and PATEL S. An efficient host overload detection algorithm for cloud data center based on exponential weighted moving average[J]. International Journal of Communication Systems, 2021, 34(4): e4708. doi:  10.1002/dac.4708 | 
| [18] | 马彬, 汪栋, 谢显中. 异构无线网络中新的成本感知网络切换方案[J]. 电子学报, 2018, 46(5): 1227–1233. doi:  10.3969/j.issn.0372-2112.2018.05.031 MA Bin, WANG Dong, and XIE Xianzhong. A novel cost-aware network handoff scheme in heterogeneous wireless network[J]. Acta Electronica Sinica, 2018, 46(5): 1227–1233. doi:  10.3969/j.issn.0372-2112.2018.05.031 | 
| [19] | YU Hewei and ZHANG Biao. A hybrid MADM algorithm based on attribute weight and utility value for heterogeneous network selection[J]. Journal of Network and Systems Management, 2019, 27(3): 756–783. doi:  10.1007/s10922-018-9483-y | 
