Silvance Abeka

Work place: School of Informatics and Innovative Systems, Jaramogi Oginga Odinga University of Science & Technology, Kisumu – Kenya

E-mail:

Website:

Research Interests: Statistics, Information Systems, Systems Architecture, Computer systems and computational processes, Management Information System

Biography

Dr. Silvance O. Abeka is currently the Dean, School Of Informatics And Innovative Systems, Jaramogi Oginga Odinga University of Science And Technology. He holds a masters degree in Business Administration (Information Techn- ology) and a PhD in Management Information Science (MIS), from Kampala International University, Dar es Salaam Collage. His interests include Management Information Systems, Principles of Statistics and E- Commerce. He is also a lecturer in the school of Computer Studies.

Author Articles
Multivariate Probabilistic Synthesis of Cellular Networks Teletraffic Blocking with Poissonian Distribution Arrival Rates

By Vincent Omollo Nyangaresi Silvance Abeka Anthony Rodrigues

DOI: https://doi.org/10.5815/ijwmt.2018.04.02, Pub. Date: 8 Jul. 2018

Cellular networks are characterized by mobility in which subscribers move freely within the coverage area. Since the radio spectrum is a scarce resource, the available bandwidth is divided by using a combination of Time- and Frequency-Division Multiple Access (TDMA) Code Division Multiple Access (CDMA) and Frequency Division Multiple Access (FDMA). For communication process to succeed, the subscriber must be allocated some frequency band (FDMA), a time slot (TDMA) or pseudorandom binary sequence that modulates the carrier (CDMA). With the increasing number of users, these resources may become unavailable, leading to new call blocking or handover call blocking. Erlang B and Erlang C have been used in the past to model teletraffic blocking in Public Switched Telephone Network (PSTN). Unfortunately, Erlang B is only ideal when subscribers do not perform call re-attempts after their initial calls are blocked. On the other hand, Erlang C model is applicable only in networks where queuing is applied and can easily lead to higher blocking rates when the number of users is high. This is because it takes into consideration the number of instances in the queue as well as the resources under use. In this paper, teletraffic blocking probabilities that take into account additional cellular network concepts such as the number of mobile stations, call retries, channels reservation, overlays and underlays, user velocity, relative mobility, call priority, call arrival rates and signal to interference plus noise ratio (SINR) were synthesized. The simulation results showed that the developed teletraffic blocking probabilities were superior to the conventional Erlang B and Erlang C as they consider new concepts that exist in cellular networks that were not envisioned in traditional PSTN.

[...] Read more.
Security Evaluation of Cellular Networks Handover Techniques

By Vincent Omollo Nyangaresi Silvance Abeka Anthony Rodrigues

DOI: https://doi.org/10.5815/ijcnis.2018.05.06, Pub. Date: 8 May 2018

This paper examined the handovers in cellular networks from both functional and informational security point of view. The aim was to find out if the security goals of confidentiality, integrity and availability (CIA) are preserved during handovers. Whereas functional security is concerned with the proper operation of the handover procedures, informational security deals with confidentiality and integrity of the handover process. The global system for mobile communication provides data and voice communication services by partitioning coverage areas into hexagonal cells. Since mobility is a prime feature of cellular networks, handovers become significant for the continuity of ongoing calls. However, if these handovers are not handled carefully, session hijacking, masquerading and denial of service can be launched by transmitting at the correct timeslot and frequency. The results of the security investigation of the current handover techniques, methods, procedures, schemes and criteria revealed that the CIA triad was not assured during the handover period. The root cause of these attacks is high latency between handover request and handover execution. To address these shortcomings, this paper proposes an authenticated multi-factor neuro fuzzy handover protocol with low latency for both homogenous and heterogeneous cellular environments.

[...] Read more.
Other Articles