ABSTRACT
Recent trends bring Identity concepts into the application layer, although usually focusing in web environments. While this enables new solutions, interactions and paradigms at the application layer, the lower layers are neglected, and considered irrelevant for identity purposes. However, making Identity information available to the OSI stack enables enhanced protocols, which better integrate with A4C mechanisms, and provide better cross-layer integration. We present a solution to integrate identity information into all layers of the OSI stack, and enhance it with resolution mechanisms, enabling full fledged use of Identity by lower layers, such as transport and network. In particular, a new mobility paradigm can be created through an identity-dependent design.
- Olivereau, A. et all, "An Advanced Authorization Framework for IPbased B3G Systems". In Proceedings of the 14th IST Mobile & Wireless Communications Summit; Dresden, Germany, June 19--23, 2005.Google Scholar
- Julien Abeillé, et al, "MobiSplit: a scalable approach to emerging mobility networks", First International Workshop on Mobility in the Evolving Internet Architecture (MobiArch 2006), pp 17--22, Dec 1, 2006. Google ScholarDigital Library
- Aguiar, R., Einsiedler, H., Karrer, R., "Daidalos: The Operators Vision of the Next Generation Internet", in Infocom 2006, Barcelona, Spain, April 23--29.Google Scholar
- ITU-T Y.2011, "Next Generation Networks -- Frameworks and functional architecture models, General principles and general reference model for Next Generation Networks", 10/2004Google Scholar
- Perkins, C. et al, "Mobility Support in IPv6 (MIPv6)", IETF RFC, June 2004.Google Scholar
- R. Moskowitz, "Host Identity Protocol" IETF Internet Draft (Work in Progress), July 2006.Google Scholar
- IEEE P802.21/D04.00, "Draft IEEE Standard for Local and Metropolitan Area Networks: Media Independent Handover Services", March 2007Google Scholar
- Frosberg, D et al, "Protocol for Carrying Authentication for Network Acess (PANA)", IETF Internet Draft (Work in Progress), March, 2007.Google Scholar
- H. Balakrishnan, et al. "A Layered Naming Architecture for the Internet". SIGCOMM, Portland OR, Aug 2004. Google ScholarDigital Library
- Xiaoming Fu et al., "NSIS: a new extensible IP signaling protocol suite", IEEE Communications Magazine, October 2005:133--141 Google ScholarDigital Library
- J. Rosenberg, et al, "SIP: Session Initiation Protocol", IETF RFC 3261, June 2002. Google ScholarDigital Library
- D. Recordon and B. Fitzpatrick, "OpenID Authentication 1.1", May 2006.Google Scholar
- Windows Cardspace, Internet Address: http://cardspace.netfx3.com/content/introduction.aspxGoogle Scholar
- IST FP6 Integrated Project Daidalos: http://www.ist-daidalos.orgGoogle Scholar
- Aguiar, R, Banchs, A, Melia, T, Pacyna, P, "NIHO: Network Initiated Handovers for next generation ALL IP Networks", in Infocom 2006, Barcelona, Spain, April 23--29, 2006.Google Scholar
Recommendations
Enhanced Mobile IP handoff using link layer information
iiWAS '09: Proceedings of the 11th International Conference on Information Integration and Web-based Applications & ServicesNetwork layer indications are not readily available upon a link change; therefore, general dependence on the network layer may introduce unnecessary delays due to network layer signaling for a simple link layer handoff. If information could be gathered ...
A Cross-Layer Approach for Improving TCP Performance in Mobile Environments
Network-layer mobility protocols have been developed to keep continuous connectivity for mobile hosts while transparent to the higher layers. However, Due to its distinct characteristics of different from traditional TCP/IP environment, mobility poses ...
Handoff management in 4G networks
IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World WirelesslyNext generation wireless and mobile communication systems integrate different wireless networks; each network is optimized for some specific services and coverage area to satisfy the demands of various network users.
A widespread vision of the fourth ...
Comments