Skip to main content
Erschienen in: Wireless Networks 4/2019

04.12.2017

Secure and efficient binding updates in host-based distributed mobility management

verfasst von: Seyeong Lee, Hyoung-Kee Choi, Ejin Kim, Jong-Hyouk Lee

Erschienen in: Wireless Networks | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Rapid evolution in mobile communication is geared toward reliable and responsive network connectivity, thereby necessitating a network protocol operated in a distributed fashion. Distributed mobility management (DMM) achieves low latency and high reliability by shifting the main signaling functions from the core center to the edge of the network. However, there is still room for improvement, especially in the delay response of security operations. This paper proposes the design of an efficient security protocol for binding updates in a DMM environment. The proposed security protocol is designed especially for host-based DMM in which a mobile node plays an active role in mobility and authentication signaling instead of delegating it to the network. The security and performance of the new design are evaluated via theoretical analysis and empirical evaluation in both a laboratory and a live network setting. Based on these evaluations, we contend that in terms of security and performance the proposed security protocol is practical for host-based DMM.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Simsek, M., et al. (2016). 5G-enabled Tactile Internet. IEEE Journal of Selected Areas in Communications, 34(3), 460–473.CrossRef Simsek, M., et al. (2016). 5G-enabled Tactile Internet. IEEE Journal of Selected Areas in Communications, 34(3), 460–473.CrossRef
2.
Zurück zum Zitat Maier, M., et al. (2016). The Tactile Internet: vision, recent progress, and open challenges. IEEE Communications Magazine, 54(5), 138–145.CrossRef Maier, M., et al. (2016). The Tactile Internet: vision, recent progress, and open challenges. IEEE Communications Magazine, 54(5), 138–145.CrossRef
3.
Zurück zum Zitat Perkins, C., Johnson, D., & Arkko, J. (2011). Mobility support in IPv6. IETF RFC 6275. Perkins, C., Johnson, D., & Arkko, J. (2011). Mobility support in IPv6. IETF RFC 6275.
4.
Zurück zum Zitat Gundavelli, S., et al. (2008). Proxy mobile IPv6. IETF RFC 5213. Gundavelli, S., et al. (2008). Proxy mobile IPv6. IETF RFC 5213.
5.
Zurück zum Zitat Soliman, H. (2009). Mobile IPv6 support for dual stack hosts and routers. IETF RFC 5555. Soliman, H. (2009). Mobile IPv6 support for dual stack hosts and routers. IETF RFC 5555.
6.
Zurück zum Zitat Lee, J., et al. (2014). Mobile data offloading: A host-based distributed mobility management approach. IEEE Internet Computing, 18(01), 20–29.CrossRef Lee, J., et al. (2014). Mobile data offloading: A host-based distributed mobility management approach. IEEE Internet Computing, 18(01), 20–29.CrossRef
7.
Zurück zum Zitat Liu, D., et al. (2015). Distributed mobility management: Current practices and gap analysis. IETF RFC 7429. Liu, D., et al. (2015). Distributed mobility management: Current practices and gap analysis. IETF RFC 7429.
8.
Zurück zum Zitat Lee, J., et al. (2013). Distributed IP mobility management from the perspective of the IETF: Motivations, requirements, approaches, comparison, and challenges. IEEE Wireless Communications, 20(5), 159–168.CrossRef Lee, J., et al. (2013). Distributed IP mobility management from the perspective of the IETF: Motivations, requirements, approaches, comparison, and challenges. IEEE Wireless Communications, 20(5), 159–168.CrossRef
9.
Zurück zum Zitat Dummit, D., Dummit, E., & Kisilevsky, H. (2016). Characterizations of quadratic, cubic, and quartic residue matrices. Journal of Number Theory, 168, 167–179.MathSciNetCrossRefMATH Dummit, D., Dummit, E., & Kisilevsky, H. (2016). Characterizations of quadratic, cubic, and quartic residue matrices. Journal of Number Theory, 168, 167–179.MathSciNetCrossRefMATH
10.
Zurück zum Zitat Elia, M., Piva, M., & Schipani, D. (2015). The Rabin cryptosystem revisited. Applicable Algebra in Engineering, Communication and Computing, 26(3), 251–275.MathSciNetCrossRefMATH Elia, M., Piva, M., & Schipani, D. (2015). The Rabin cryptosystem revisited. Applicable Algebra in Engineering, Communication and Computing, 26(3), 251–275.MathSciNetCrossRefMATH
12.
Zurück zum Zitat Chuang, M., Lee, J., & Chen, M. (2013). SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks. IEEE Systems Journal, 7(1), 102–113.CrossRef Chuang, M., Lee, J., & Chen, M. (2013). SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks. IEEE Systems Journal, 7(1), 102–113.CrossRef
13.
Zurück zum Zitat Lee, J. (2016). Secure authentication with dynamic tunneling in distributed IP mobility management. IEEE Wireless Communications, 23(5), 38–43.CrossRef Lee, J. (2016). Secure authentication with dynamic tunneling in distributed IP mobility management. IEEE Wireless Communications, 23(5), 38–43.CrossRef
14.
Zurück zum Zitat Rossi, A., Pierre, S., & Krishnan, S. (2013). Secure route optimization for MIPv6 using enhanced CGA and DNSSEC. IEEE Systems Journal, 7(3), 351–362.CrossRef Rossi, A., Pierre, S., & Krishnan, S. (2013). Secure route optimization for MIPv6 using enhanced CGA and DNSSEC. IEEE Systems Journal, 7(3), 351–362.CrossRef
15.
Zurück zum Zitat Snoeren, A., & Balakrishnan, H. (2000). An end-to-end approach to host mobility. In Proceedings of ACM/IEEE international conference on mobile computing and networking (MobiCom). Snoeren, A., & Balakrishnan, H. (2000). An end-to-end approach to host mobility. In Proceedings of ACM/IEEE international conference on mobile computing and networking (MobiCom).
16.
Zurück zum Zitat Aura, T., et al. (2004). Effects of mobility and multihoming on transport-protocol security. In Proceedings of IEEE symposium security and privacy. Aura, T., et al. (2004). Effects of mobility and multihoming on transport-protocol security. In Proceedings of IEEE symposium security and privacy.
17.
Zurück zum Zitat Seggelmann, R., et al. (2012). DTLS mobility. In Proceedings of international conference of distributed computing and networking (ICDCN), pp. 443–457, Hong Kong, China. Seggelmann, R., et al. (2012). DTLS mobility. In Proceedings of international conference of distributed computing and networking (ICDCN), pp. 443–457, Hong Kong, China.
18.
Zurück zum Zitat Moskowitz, R., et al. (2008). Host identity protocol. IETF RFC 5201. Moskowitz, R., et al. (2008). Host identity protocol. IETF RFC 5201.
19.
Zurück zum Zitat Raiciu, C., et al. (2011). Opportunistic mobility with multipath TCP. In Proceedings of the sixth international workshop on MobiArch, pp. 7–12, Bethesda, USA. Raiciu, C., et al. (2011). Opportunistic mobility with multipath TCP. In Proceedings of the sixth international workshop on MobiArch, pp. 7–12, Bethesda, USA.
20.
Zurück zum Zitat Jadin, M., et al. (2017). Securing multipath TCP: Design and implementation. In Proceedings of IEEE international conference on computer communications (INFOCOM), Atlanta, USA. Jadin, M., et al. (2017). Securing multipath TCP: Design and implementation. In Proceedings of IEEE international conference on computer communications (INFOCOM), Atlanta, USA.
21.
Zurück zum Zitat Cui, Y., et al. (2017). Innovating transport with QUIC: Design approaches and research challenges. IEEE Internet Computing, 21(2), 72–76.CrossRef Cui, Y., et al. (2017). Innovating transport with QUIC: Design approaches and research challenges. IEEE Internet Computing, 21(2), 72–76.CrossRef
22.
Zurück zum Zitat Eronen, P., et al. (2006). IKEv2 mobility and multihoming (MOBIKE) protocol. IETF RFC 4621. Eronen, P., et al. (2006). IKEv2 mobility and multihoming (MOBIKE) protocol. IETF RFC 4621.
23.
Zurück zum Zitat Korhonen, J., et al. (2012). Mobile IPv6 security framework using transport layer security for communication between the mobile node and home agent. IETF RFC 6618. Korhonen, J., et al. (2012). Mobile IPv6 security framework using transport layer security for communication between the mobile node and home agent. IETF RFC 6618.
24.
Zurück zum Zitat Forsberg, D., et al. (2008). Protocol for carrying authentication for network access (PANA). IETF RFC 5191. Forsberg, D., et al. (2008). Protocol for carrying authentication for network access (PANA). IETF RFC 5191.
25.
Zurück zum Zitat Zorn, G., et al. (2012). Handover Keying (HOKEY) architecture design. IETF RFC 6697. Zorn, G., et al. (2012). Handover Keying (HOKEY) architecture design. IETF RFC 6697.
Metadaten
Titel
Secure and efficient binding updates in host-based distributed mobility management
verfasst von
Seyeong Lee
Hyoung-Kee Choi
Ejin Kim
Jong-Hyouk Lee
Publikationsdatum
04.12.2017
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 4/2019
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-017-1603-1

Weitere Artikel der Ausgabe 4/2019

Wireless Networks 4/2019 Zur Ausgabe

Neuer Inhalt