skip to main content
10.1145/1366919.1366927acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Embedding identity in mobile environments

Published:27 August 2007Publication History

ABSTRACT

Recent trends bring Identity concepts into the application layer, although usually focusing in web environments. While this enables new solutions, interactions and paradigms at the application layer, the lower layers are neglected, and considered irrelevant for identity purposes. However, making Identity information available to the OSI stack enables enhanced protocols, which better integrate with A4C mechanisms, and provide better cross-layer integration. We present a solution to integrate identity information into all layers of the OSI stack, and enhance it with resolution mechanisms, enabling full fledged use of Identity by lower layers, such as transport and network. In particular, a new mobility paradigm can be created through an identity-dependent design.

References

  1. Olivereau, A. et all, "An Advanced Authorization Framework for IPbased B3G Systems". In Proceedings of the 14th IST Mobile & Wireless Communications Summit; Dresden, Germany, June 19--23, 2005.Google ScholarGoogle Scholar
  2. Julien Abeillé, et al, "MobiSplit: a scalable approach to emerging mobility networks", First International Workshop on Mobility in the Evolving Internet Architecture (MobiArch 2006), pp 17--22, Dec 1, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Aguiar, R., Einsiedler, H., Karrer, R., "Daidalos: The Operators Vision of the Next Generation Internet", in Infocom 2006, Barcelona, Spain, April 23--29.Google ScholarGoogle Scholar
  4. ITU-T Y.2011, "Next Generation Networks -- Frameworks and functional architecture models, General principles and general reference model for Next Generation Networks", 10/2004Google ScholarGoogle Scholar
  5. Perkins, C. et al, "Mobility Support in IPv6 (MIPv6)", IETF RFC, June 2004.Google ScholarGoogle Scholar
  6. R. Moskowitz, "Host Identity Protocol" IETF Internet Draft (Work in Progress), July 2006.Google ScholarGoogle Scholar
  7. IEEE P802.21/D04.00, "Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services", March 2007Google ScholarGoogle Scholar
  8. Frosberg, D et al, "Protocol for Carrying Authentication for Network Acess (PANA)", IETF Internet Draft (Work in Progress), March, 2007.Google ScholarGoogle Scholar
  9. H. Balakrishnan, et al. "A Layered Naming Architecture for the Internet". SIGCOMM, Portland OR, Aug 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Xiaoming Fu et al., "NSIS: a new extensible IP signaling protocol suite", IEEE Communications Magazine, October 2005:133--141 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Rosenberg, et al, "SIP: Session Initiation Protocol", IETF RFC 3261, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Recordon and B. Fitzpatrick, "OpenID Authentication 1.1", May 2006.Google ScholarGoogle Scholar
  13. Windows Cardspace, Internet Address: http://cardspace.netfx3.com/content/introduction.aspxGoogle ScholarGoogle Scholar
  14. IST FP6 Integrated Project Daidalos: http://www.ist-daidalos.orgGoogle ScholarGoogle Scholar
  15. Aguiar, R, Banchs, A, Melia, T, Pacyna, P, "NIHO: Network Initiated Handovers for next generation ALL IP Networks", in Infocom 2006, Barcelona, Spain, April 23--29, 2006.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    MobiArch '07: Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture
    August 2007
    85 pages
    ISBN:9781595937841
    DOI:10.1145/1366919

    Copyright © 2007 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 27 August 2007

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate47of92submissions,51%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader