{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T14:13:20Z","timestamp":1765808000843,"version":"3.41.2"},"reference-count":20,"publisher":"World Scientific Pub Co Pte Ltd","issue":"03","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Inter. Net."],"published-print":{"date-parts":[[2022,9]]},"abstract":"<jats:p> With the continuous development of social economy, mobile wireless network as an important network communication mode is more and more widely used, but its security is worth paying attention to. According to different environment possible switch mobile wireless network security problem, the paper introduced secure localization algorithm, through combing the existing security vertical switching process, the corresponding vertical safety switch security index system was constructed, and the simulation experiment, from safety factor to switch from the mobile wireless network security monitoring the status of the transformation, and use the safety parameter to carry on the quantified computation expression. The simulation results prove that the visualization of the 5G network clearly shows the status of WLAN1. The simulation results show that the secure location algorithm is effective and can support secure vertical handoff in mobile wireless network. <\/jats:p>","DOI":"10.1142\/s0219265921450092","type":"journal-article","created":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T08:10:20Z","timestamp":1644221420000},"source":"Crossref","is-referenced-by-count":2,"title":["Secure Vertical Handoff in Mobile Wireless Network Based on Secure Location Algorithm"],"prefix":"10.1142","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4697-5332","authenticated-orcid":false,"given":"Jingchan","family":"Ji","sequence":"first","affiliation":[{"name":"Liuzhou Railway Vocational Technical College, Liuzhou 545007, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2022,2,4]]},"reference":[{"issue":"1","key":"S0219265921450092BIB001","first-page":"417","volume":"4","author":"Li X.","year":"2017","journal-title":"Future Generation Computer Systems"},{"key":"S0219265921450092BIB002","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2017.6356"},{"issue":"7","key":"S0219265921450092BIB003","first-page":"1","volume":"7","author":"Yew H. T.","year":"2016","journal-title":"International Journal of Advanced Computer ence & Applications"},{"key":"S0219265921450092BIB004","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0779"},{"issue":"6","key":"S0219265921450092BIB005","first-page":"40","volume":"32","author":"Lei L.","year":"2019","journal-title":"International Journal of Communication Systems"},{"issue":"5","key":"S0219265921450092BIB006","first-page":"56","volume":"7","author":"He D.","year":"2017","journal-title":"Science China Information Sciences"},{"key":"S0219265921450092BIB007","doi-asserted-by":"publisher","DOI":"10.3390\/s17061446"},{"key":"S0219265921450092BIB008","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869671"},{"key":"S0219265921450092BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.07.003"},{"issue":"19","key":"S0219265921450092BIB010","first-page":"9221","volume":"9","author":"Narwal B.","year":"2016","journal-title":"International Journal of Control Theory and Applications"},{"key":"S0219265921450092BIB011","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2020.109976"},{"key":"S0219265921450092BIB012","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6751423"},{"issue":"2","key":"S0219265921450092BIB013","first-page":"56","volume":"11","author":"Lee J.","year":"2015","journal-title":"Wireless Communications & Mobile Computing"},{"key":"S0219265921450092BIB014","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.5.07"},{"key":"S0219265921450092BIB015","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113232"},{"issue":"1","key":"S0219265921450092BIB016","first-page":"29","volume":"4","author":"Kong Q.","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"key":"S0219265921450092BIB017","doi-asserted-by":"publisher","DOI":"10.1504\/IJMNDI.2018.090159"},{"key":"S0219265921450092BIB018","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.05.009"},{"key":"S0219265921450092BIB019","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1581-y"},{"issue":"4","key":"S0219265921450092BIB020","first-page":"109","volume":"125","author":"Sharma V.","year":"2018","journal-title":"Journal of Network and Computer Applications"}],"container-title":["Journal of Interconnection Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219265921450092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T08:15:21Z","timestamp":1653552921000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219265921450092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,4]]},"references-count":20,"journal-issue":{"issue":"03","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["10.1142\/S0219265921450092"],"URL":"https:\/\/doi.org\/10.1142\/s0219265921450092","relation":{},"ISSN":["0219-2659","1793-6713"],"issn-type":[{"type":"print","value":"0219-2659"},{"type":"electronic","value":"1793-6713"}],"subject":[],"published":{"date-parts":[[2022,2,4]]},"article-number":"2145009"}}