Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2018

17.05.2017

SEIP: Secure and seamless IP communications for group-oriented machine to machine communications

verfasst von: Chengzhe Lai, Wenlong Guo, Yafei Li, Dong Zheng

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The main requirements of machine to machine (M2M) communication in 5G include support of a massive number of low-data-rate devices and very-low-latency data transfer. Addressing these requirements in 5G requires new methods and in this paper we focus on one of the paramount issues, i.e., secure and seamless IP communications for group-oriented M2M communications. We consider a heterogeneous network architecture based on 3GPP standard, in which the handover occurs between E-UTRAN and Non-3GPP access network. We first propose an improved Proxy Mobile IPv6 (PMIPv6) protocol, and further implement the improved PMIPv6 associated with the group-based lightweight authentication scheme to achieve secure and seamless IP communications, named SEIP, which improves handover latency, packet loss, and signaling overhead. Particularly, SEIP performs access authentication process before IP layer (L3) and link layer (L2) handover to reduce handover delay. In addition, it uses packet buffering and forwarding mechanisms to reduce packet loss during the handover period. SEIP can not only fulfill security requirements in previous protocols, but also can successfully resist some sophisticated attacks, such as redirection, DoS attacks, etc. The results of performance analysis illustrate that SEIP achieves better performance in terms of signaling cost on wireless link, handover latency and packet loss compared to several other schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
M2M D l e a d e r can be selected based on the communication capability, storage status and battery status of each M2MD or can be assigned in advance according to the requirement of applications.
 
Literatur
1.
Zurück zum Zitat Lu R, Li X, Liang X, Shen X, Lin X (2011) Grs: The green, reliability, and security of emerging machine to machine communications. IEEE Commun Mag 49(4):28–35CrossRef Lu R, Li X, Liang X, Shen X, Lin X (2011) Grs: The green, reliability, and security of emerging machine to machine communications. IEEE Commun Mag 49(4):28–35CrossRef
2.
Zurück zum Zitat Li X, Rao J, Zhang H (2016) Engineering machine-to-machine traffic in 5G. IEEE Int Things J 3 (4):609–618CrossRef Li X, Rao J, Zhang H (2016) Engineering machine-to-machine traffic in 5G. IEEE Int Things J 3 (4):609–618CrossRef
3.
Zurück zum Zitat Gazis VA survey of standards for machine to machine (M2M) and the internet of things (IoT). IEEE Commun Surv Tutor, to appear Gazis VA survey of standards for machine to machine (M2M) and the internet of things (IoT). IEEE Commun Surv Tutor, to appear
4.
Zurück zum Zitat 3GPP TR 23.888 V1.4.0, System Improvements for Machine-Type Communications, August 2011 3GPP TR 23.888 V1.4.0, System Improvements for Machine-Type Communications, August 2011
5.
Zurück zum Zitat Kushalnagar N, Montenegro G, Schumacher C (2007) IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. Heise Zeitschriften Verlag Kushalnagar N, Montenegro G, Schumacher C (2007) IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. Heise Zeitschriften Verlag
6.
Zurück zum Zitat Floroiu JW, Ruppelt R, Sisalem D, Voglimacci J (2003) Seamless handover in terrestrial radio access networks: A case study. IEEE Commun Mag 41(11):110–116CrossRef Floroiu JW, Ruppelt R, Sisalem D, Voglimacci J (2003) Seamless handover in terrestrial radio access networks: A case study. IEEE Commun Mag 41(11):110–116CrossRef
7.
Zurück zum Zitat Perkins C (1996) Ip mobility support. Int J Comput Trends Technol 9:7 Perkins C (1996) Ip mobility support. Int J Comput Trends Technol 9:7
8.
Zurück zum Zitat Deering S (1998) Rfc 2460: Internet protocol, version 6 (ipv6) specification. In: RTP, UDP, ESP, and uncompressed, pp 1860–1864 Deering S (1998) Rfc 2460: Internet protocol, version 6 (ipv6) specification. In: RTP, UDP, ESP, and uncompressed, pp 1860–1864
9.
Zurück zum Zitat Perkins CE, Johnson DB (2001) Mobility support in IPv6. RFC 3775 Perkins CE, Johnson DB (2001) Mobility support in IPv6. RFC 3775
10.
Zurück zum Zitat Koodli R (2005) Fast handovers for mobile IPv6. RFC 4068 Koodli R (2005) Fast handovers for mobile IPv6. RFC 4068
11.
Zurück zum Zitat Soliman H, Castelluccia C, El-Malki K, Bellier L, Soliman H, Castelluccia C, El-Malki K, Bellier L (2008) Hierarchical mobile IPv6 (HMIPv6) mobility management. RFC 4140 Soliman H, Castelluccia C, El-Malki K, Bellier L, Soliman H, Castelluccia C, El-Malki K, Bellier L (2008) Hierarchical mobile IPv6 (HMIPv6) mobility management. RFC 4140
12.
Zurück zum Zitat Lee K, Mun Y (2009) Fast macro mobility handovers in HMIPv6 draft-mun-mipshop-fhmacro-04 Lee K, Mun Y (2009) Fast macro mobility handovers in HMIPv6 draft-mun-mipshop-fhmacro-04
13.
Zurück zum Zitat Gundavelli ES, Leung K, Devarapalli V, Chowdhury K, Patil B (2008) Proxy mobile IPv6. RFC 5213 Gundavelli ES, Leung K, Devarapalli V, Chowdhury K, Patil B (2008) Proxy mobile IPv6. RFC 5213
14.
Zurück zum Zitat Ryu S, Kim GY, Kim B, Mun Y (2008) A scheme to reduce packet loss during PMIPv6 handover considering authentication. In: International conference on computational sciences and its applications, pp 47–51 Ryu S, Kim GY, Kim B, Mun Y (2008) A scheme to reduce packet loss during PMIPv6 handover considering authentication. In: International conference on computational sciences and its applications, pp 47–51
15.
Zurück zum Zitat Ryu S, Kim M, Mun Y (2009) Enhanced fast handovers for proxy mobile IPv6. In: International conference on computational science and its applications, pp 39–43 Ryu S, Kim M, Mun Y (2009) Enhanced fast handovers for proxy mobile IPv6. In: International conference on computational science and its applications, pp 39–43
16.
Zurück zum Zitat Lee S, Latchman HA, Park B (2010) Efficient handover scheme of proxy mobile IPv6 in wireless local area networks. Int J Multimed Ubiquit Eng 5 Lee S, Latchman HA, Park B (2010) Efficient handover scheme of proxy mobile IPv6 in wireless local area networks. Int J Multimed Ubiquit Eng 5
17.
Zurück zum Zitat Ali-Ahmad H, Ouzzif M, Bertin P, Lagrange X (2012) Comparative performance analysis on dynamic mobility anchoring and proxy mobile IPv6. In: International conference on information, networking and automation (ICINA), pp 653–657 Ali-Ahmad H, Ouzzif M, Bertin P, Lagrange X (2012) Comparative performance analysis on dynamic mobility anchoring and proxy mobile IPv6. In: International conference on information, networking and automation (ICINA), pp 653–657
18.
Zurück zum Zitat Tsao SL, Lin CC (2002) Design and evaluation of UMTS-WLAN interworking strategies. IEEE VTC 2002 Fall 2:777–781 Tsao SL, Lin CC (2002) Design and evaluation of UMTS-WLAN interworking strategies. IEEE VTC 2002 Fall 2:777–781
19.
Zurück zum Zitat Chen J-C, Chen W-M, Lin H-W (2005) Design and analysis of GPRS-WLAN mobility gateway (GWMG). IEEE Int Conf Commun 2:918–923 Chen J-C, Chen W-M, Lin H-W (2005) Design and analysis of GPRS-WLAN mobility gateway (GWMG). IEEE Int Conf Commun 2:918–923
20.
Zurück zum Zitat Phiri FA, Murthy M (2007) WLAN-GPRS tight coupling based interworking architecture with vertical handoff support. Wirel Pers Commun 40(2):137–144CrossRef Phiri FA, Murthy M (2007) WLAN-GPRS tight coupling based interworking architecture with vertical handoff support. Wirel Pers Commun 40(2):137–144CrossRef
21.
Zurück zum Zitat Lu R, Lin X, Zhu H, Ho P-H, Shen X (2009) A novel anonymous mutual authentication protocol with provable link-layer location privacy. IEEE Trans Veh Technol 58(3):1454–1466CrossRef Lu R, Lin X, Zhu H, Ho P-H, Shen X (2009) A novel anonymous mutual authentication protocol with provable link-layer location privacy. IEEE Trans Veh Technol 58(3):1454–1466CrossRef
22.
Zurück zum Zitat Zhu H, Lin X, Lu R, Ho P-h, et al (2008) Slab: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans Wirel Commun 7(10):3858–3868CrossRef Zhu H, Lin X, Lu R, Ho P-h, et al (2008) Slab: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans Wirel Commun 7(10):3858–3868CrossRef
23.
Zurück zum Zitat Wu IW, Chen WS, Liao HE, Young FF (2002) A seamless handoff approach of mobile ip protocol for mobile wireless data networks. IEEE Trans Consum Electron 48(2):335–344CrossRef Wu IW, Chen WS, Liao HE, Young FF (2002) A seamless handoff approach of mobile ip protocol for mobile wireless data networks. IEEE Trans Consum Electron 48(2):335–344CrossRef
24.
Zurück zum Zitat Badache N, Tandjaoui D (2002) A seamless handoff protocol for hierarchical mobile ipv4. In: International workshop on mobile and wireless communications network, pp 651–655 Badache N, Tandjaoui D (2002) A seamless handoff protocol for hierarchical mobile ipv4. In: International workshop on mobile and wireless communications network, pp 651–655
25.
Zurück zum Zitat Lai C, Lu R, Zheng D, Li H, Shen X (2016) GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Comput Netw 99:66– 81CrossRef Lai C, Lu R, Zheng D, Li H, Shen X (2016) GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Comput Netw 99:66– 81CrossRef
26.
Zurück zum Zitat Lai C, Li H, Li X, Cao J (2013) A novel group access authentication and key agreement protocol for machine-type communication. Trans Emerg Telecommun Technol 26(3):414–431CrossRef Lai C, Li H, Li X, Cao J (2013) A novel group access authentication and key agreement protocol for machine-type communication. Trans Emerg Telecommun Technol 26(3):414–431CrossRef
27.
Zurück zum Zitat Piscataway N (1996) Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE D3:C1–1184 Piscataway N (1996) Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE D3:C1–1184
28.
Zurück zum Zitat Katz J, Lindell A (2008) Aggregate message authentication codes. In: Topics in cryptology–CT-RSA 2008. Springer, pp 155–169 Katz J, Lindell A (2008) Aggregate message authentication codes. In: Topics in cryptology–CT-RSA 2008. Springer, pp 155–169
29.
Zurück zum Zitat Huang J-L, Yeh L-Y, Chien H-Y (2011) ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans Veh Technol 60(1):248–262CrossRef Huang J-L, Yeh L-Y, Chien H-Y (2011) ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans Veh Technol 60(1):248–262CrossRef
30.
Zurück zum Zitat Lo SC, Lee G, Chen WT, Liu JC (2004) Architecture for mobility and QoS support in all-IP wireless networks. IEEE J Select Areas Commun 22(4):691–705CrossRef Lo SC, Lee G, Chen WT, Liu JC (2004) Architecture for mobility and QoS support in all-IP wireless networks. IEEE J Select Areas Commun 22(4):691–705CrossRef
31.
Zurück zum Zitat Kong KS, Lee W, Han YH, Shin MK (2008) Mobility management for all-IP mobile networks: Mobile IPv6 vs. proxy mobile IPv6. IEEE Wirel Commun 15(2):36–45CrossRef Kong KS, Lee W, Han YH, Shin MK (2008) Mobility management for all-IP mobile networks: Mobile IPv6 vs. proxy mobile IPv6. IEEE Wirel Commun 15(2):36–45CrossRef
32.
Zurück zum Zitat Stephane A, Aghvami A H (2001) Fast handover schemes for future wireless ip networks: A proposal and analysis. In: Vehicular technology conference, 1988, IEEE 38th, vol 3, pp 2046–2050 Stephane A, Aghvami A H (2001) Fast handover schemes for future wireless ip networks: A proposal and analysis. In: Vehicular technology conference, 1988, IEEE 38th, vol 3, pp 2046–2050
33.
Zurück zum Zitat Han YH, Choi JH, Hwang SH (2006) Reactive handover optimization in IPv6-based mobile networks. IEEE J Selected Areas Commun 24(9):1758–1772CrossRef Han YH, Choi JH, Hwang SH (2006) Reactive handover optimization in IPv6-based mobile networks. IEEE J Selected Areas Commun 24(9):1758–1772CrossRef
34.
Zurück zum Zitat Seite P (2010) Ipv6 stateless address autoconfiguration Seite P (2010) Ipv6 stateless address autoconfiguration
35.
Zurück zum Zitat Fathi H, Prasad R, Chakraborty S (2005) Mobility management for VoIP in 3G systems: Evaluation of low-latency handoff schemes. IEEE Wirel Commun 12(2):96–104CrossRef Fathi H, Prasad R, Chakraborty S (2005) Mobility management for VoIP in 3G systems: Evaluation of low-latency handoff schemes. IEEE Wirel Commun 12(2):96–104CrossRef
36.
Zurück zum Zitat Narten BT, Nordmark E, Simpson W, Soliman H (2010) Neighbor discovery for ip version. Internet Eng Task Force Narten BT, Nordmark E, Simpson W, Soliman H (2010) Neighbor discovery for ip version. Internet Eng Task Force
Metadaten
Titel
SEIP: Secure and seamless IP communications for group-oriented machine to machine communications
verfasst von
Chengzhe Lai
Wenlong Guo
Yafei Li
Dong Zheng
Publikationsdatum
17.05.2017
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2018
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-017-0568-2

Weitere Artikel der Ausgabe 5/2018

Peer-to-Peer Networking and Applications 5/2018 Zur Ausgabe