Skip to main content
Erschienen in: Wireless Personal Communications 3/2017

30.11.2015

Secure Route Optimization Scheme for Network Mobility Support in Heterogeneous Mobile Networks

verfasst von: Kuinam J. Kim, Dong Chun Lee

Erschienen in: Wireless Personal Communications | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the proliferation of various wireless services such as Third Generation, Fourth Generation, Wireless Local Area Network, and Personal Area Network, etc., users request for access to the Next Generation Internet in more heterogeneous networks. The network mobility working group within the Internet Engineering Task Force introduced the Network Mobility (NEMO) concept as a network mobility basic support protocol (i.e., network moves as a unit) extended from Mobile IPv6 (MIPv6). However, this solution has the limitation of route optimization that should be always passed by Home Agents (HAs) using a bi-directional tunnel with its Mobile Router (MR). It is not also entirely supported a security requirements and various attacks (e.g., Denial of Service attack, redirect attack, etc.). Most of all, it is not mentioned how authentication issues between a HA and a Correspondent Node (CN) are solved in NEMO environments. To ameliorate these problems, we propose novel authenticated route optimization scheme to be performed by MR and CN of Mobile Network Nodes, which uses IDentity-based cryptosystem (that is, a Multi-Private Key Generator Based Authenticated Key Agreement between MRs) to look upon heterogeneous NEMO environments. In performance analysis, we analytically compute the protocol’s connectivity recovery and end-to-end delay time and then compare the security and the efficiency of proposed scheme with the NEMO Basic support protocol, i.e., RFC 3963.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Johnshon, D., Perkins, C., & Arkko, J. (2005). Mobility support in IPv6.In Internet Engineering Task Force (IETF), RFC 3775. Johnshon, D., Perkins, C., & Arkko, J. (2005). Mobility support in IPv6.In Internet Engineering Task Force (IETF), RFC 3775.
2.
Zurück zum Zitat Devaraalli, B. V., Wakikawa, R., Petrescu, A., & Thuber, P. (2006). Network mobility basic support protocol. In IETF, RFC 3963. Devaraalli, B. V., Wakikawa, R., Petrescu, A., & Thuber, P. (2006). Network mobility basic support protocol. In IETF, RFC 3963.
3.
Zurück zum Zitat Ng, C., Thubert, P., Watari, M., & Zhao, F. (2008). Network mobility route optimization problem statement. In Internet draft, draft-ietf-nemo-ro-problem-statement-03.txt (work in progress). Ng, C., Thubert, P., Watari, M., & Zhao, F. (2008). Network mobility route optimization problem statement. In Internet draft, draft-ietf-nemo-ro-problem-statement-03.txt (work in progress).
4.
Zurück zum Zitat Aura, T. (2005, March). Cryptographically Generated Addresses (CGA). In IETF, RFC 3972. Aura, T. (2005, March). Cryptographically Generated Addresses (CGA). In IETF, RFC 3972.
5.
Zurück zum Zitat Fathi, H., Shin, S., Kobara, K., Chakraborty, S. S., Imai, H., & Prasad, R. (2008). LR-AKE-based AAA for network mobility (NEMO) over wireless links. IEEE Journal on Selected Areas in Communications, 24(9), 1545–1557. Fathi, H., Shin, S., Kobara, K., Chakraborty, S. S., Imai, H., & Prasad, R. (2008). LR-AKE-based AAA for network mobility (NEMO) over wireless links. IEEE Journal on Selected Areas in Communications, 24(9), 1545–1557.
6.
Zurück zum Zitat Koo, J. D., & Lee, D. Ch. (2007). Extended ticket-based binding update (ETBU) protocol for mobile IPv6 (MIPv6) networks. IEICE Transactions on Communications, 90(4), 777–787.CrossRef Koo, J. D., & Lee, D. Ch. (2007). Extended ticket-based binding update (ETBU) protocol for mobile IPv6 (MIPv6) networks. IEICE Transactions on Communications, 90(4), 777–787.CrossRef
7.
Zurück zum Zitat Kim, S., Lee, H., & Oh, H. (2006). Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment. In ICICS 2006. Lecture Notes on Computer Science (Vol. 3783, pp.145–152). Kim, S., Lee, H., & Oh, H. (2006). Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment. In ICICS 2006. Lecture Notes on Computer Science (Vol. 3783, pp.145–152).
8.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil Pairing. In Advanced in cryptology, Crypto 2001, Lecture Notes on Computer Science (Vol. 2139, pp. 213–229). Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil Pairing. In Advanced in cryptology, Crypto 2001, Lecture Notes on Computer Science (Vol. 2139, pp. 213–229).
9.
Zurück zum Zitat Arkko, J., Devarapalli, V., & Dupont, F. (2005). Using IPsec to Protect Mobile IPv6 signaling between mobile nodes and home agents. In IETF RFC 3776. Arkko, J., Devarapalli, V., & Dupont, F. (2005). Using IPsec to Protect Mobile IPv6 signaling between mobile nodes and home agents. In IETF RFC 3776.
10.
Zurück zum Zitat Ernst, T., & Lach, H.-Y. (2008, November). Network mobility support terminology. In Internet draft, draft-ietf-nemo-terminology-06.txt (work in progress). Ernst, T., & Lach, H.-Y. (2008, November). Network mobility support terminology. In Internet draft, draft-ietf-nemo-terminology-06.txt (work in progress).
11.
Zurück zum Zitat Ng, C., Zhao, F., Watari, M., & Thubert, P. (2008). Network mobility route optimization solution space analysis. In Internet draft, draft-ietf-nemo-ro-space-analysis-03.txt (work in progress). Ng, C., Zhao, F., Watari, M., & Thubert, P. (2008). Network mobility route optimization solution space analysis. In Internet draft, draft-ietf-nemo-ro-space-analysis-03.txt (work in progress).
12.
Zurück zum Zitat Calderon, M., Bernados, C. J., Bagnulo, M., & Soto, I. (2005). Securing route optimization in NEMO. In Third international symposium on modeling and optimization in mobile, ad hoc, and wireless networks (WiOpt’05) (pp. 248–254). Calderon, M., Bernados, C. J., Bagnulo, M., & Soto, I. (2005). Securing route optimization in NEMO. In Third international symposium on modeling and optimization in mobile, ad hoc, and wireless networks (WiOpt’05) (pp. 248–254).
13.
Zurück zum Zitat McCullagh, N., & Barreto, P. S. L. M. (2005). A new two-party identity-based authenticated key agreement. In Proceedings of CTRSA 2005, Lecture Notes on Computer Science (Vol. 3376, pp. 262–274). McCullagh, N., & Barreto, P. S. L. M. (2005). A new two-party identity-based authenticated key agreement. In Proceedings of CTRSA 2005, Lecture Notes on Computer Science (Vol. 3376, pp. 262–274).
14.
Zurück zum Zitat Bellare, M., & Rogaway, P. (1994). Entity authentication and key distribution. In Advance in cryptology—Crypto’93, Lecture Notes on Computer Science (Vol. 773, pp. 232–249). Bellare, M., & Rogaway, P. (1994). Entity authentication and key distribution. In Advance in cryptologyCrypto’93, Lecture Notes on Computer Science (Vol. 773, pp. 232–249).
15.
Zurück zum Zitat Huang, C. M., Lee, C. H., & Zheng, J. R. (2006). A novel SIP-based route optimization for network mobility. IEEE Journal on Selected Areas in Communications, 24(9), 1682–1691.CrossRef Huang, C. M., Lee, C. H., & Zheng, J. R. (2006). A novel SIP-based route optimization for network mobility. IEEE Journal on Selected Areas in Communications, 24(9), 1682–1691.CrossRef
16.
Zurück zum Zitat Ahn, Y., Lee, T., & Choo, H. (2009). Lightweight bindings for mobile routers. In ICCSA 2009, Lecture Notes on Computer Science (Vol. 3981, pp. 661–670). Ahn, Y., Lee, T., & Choo, H. (2009). Lightweight bindings for mobile routers. In ICCSA 2009, Lecture Notes on Computer Science (Vol. 3981, pp. 661–670).
17.
Zurück zum Zitat Kleinrock, L. (1975). Queuing system: Theory, Vol I. New York: Wiley.MATH Kleinrock, L. (1975). Queuing system: Theory, Vol I. New York: Wiley.MATH
Metadaten
Titel
Secure Route Optimization Scheme for Network Mobility Support in Heterogeneous Mobile Networks
verfasst von
Kuinam J. Kim
Dong Chun Lee
Publikationsdatum
30.11.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3019-5

Weitere Artikel der Ausgabe 3/2017

Wireless Personal Communications 3/2017 Zur Ausgabe

Neuer Inhalt