DOI QR코드

DOI QR Code

3S: Scalable, Secure and Seamless Inter-Domain Mobility Management Scheme in Proxy Mobile IPv6 Networks

프록시 모바일 IPv6 네트워크에서 3S를 고려한 도메인간 이동성관리 기법

  • Kang, Min (Computer Enfineering, Graduate School of Information and Communication, Sungkyunkwan University) ;
  • Jeong, Jong-Pil
  • 강민 (성균관대학교 정보통신대학원 컴퓨터공학과) ;
  • 정종필 (성균관대학교 정보통신공학부)
  • Received : 2012.05.22
  • Accepted : 2012.06.08
  • Published : 2012.06.30

Abstract

Proxy Mobile IPv6 (PMIPv6) has received considerable attention between telecommunications and the Internet communities and does not require active participation of the Mobile Node (MN) by way of network-based mobility management. The PMIPv6 domain is studying establishment in progress to support extensively a number of MN by using a low handover latency. In this research, we are propose a novel 3S scheme for building Scalable and Secure and Seamless PMIPv6 domains. In the proposed scheme, all of Mobility Access Gateway (MAG) are acting as the Local Mobility Anchor (LMA) and composing a virtual ring with another MAG. General hashing is used in the efficient distribution-mapping between each MN and the MN's LMA of all MAGs. And, MAG and MN are authenticated using the symmetric key. Through mathematical analysis, we verifies the safety, scalability, and seamless service for 3S. Also, we're propose a handover procedure of 3S and show better than the existing schemes in terms of handover latency.

PMIPv6(Proxy Mobile IPv6)는 MN(Mobile Node)의 적극적인 참가를 요구하지 않는 네트워크 기반의 이동성 관리 방법으로 통신 및 인터넷 커뮤니티 사이에서 상당한 주목을 받고 있다. 그것은 낮은 핸드오버 지연을 유지하면서 다수의 MN를 지원할 수 있는 확장성 있는 PMIPv6 도메인의 구축방안은 여전히 연구가 진행 중에 있다. 본 논문에서는 확장성과 안전성 그리고 끊김없는 PMIPv6 도메인을 구축하기 위한 3S 접근 방식을 제안한다. 제안기법에서 모든 MAG(Mobility Access Gateway)는 LMA(Local Mobility Anchor)와 같은 역할을 하고 다른 MAG와 가상 링을 구성한다. 일관된 해싱은 각 MN과 모든 MAG의 MN의 LMA간 효율적인 분산 매핑에 사용된다. MAG와 MN은 대칭 키를 이용하여 인증한다. 수학적 분석을 통하여 3S의 안전성, 확장성 그리고 끊김없는 서비스를 검증한다. 또한 3S의 핸드오버 절차를 제안하고 이전의 기법에 비해 낮은 핸드오버 지연이 발생함을 보여 준다.

Keywords

References

  1. Ibrahim Al-Surmi, Mohamed Othman, and Borhanuddin Mohd Ali, "Mobility management for IP-based next generation mobile networks: Review, challenge and perspective", Journal of Network and Computer Applications, Volume 35, Issue 1, Pages 295-315, January 2012 https://doi.org/10.1016/j.jnca.2011.09.001
  2. S. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury, and B. Patil,"Proxy mobile IPv6," IETF RFC 5213, Aug. 2008.
  3. D. Johnson, C. Perkins, and J. Arkko, "Mobility support in IPv6," IETF RFC 3773, June 2004.
  4. Hongbin Luo, Hongke Zhang, Yajuan Qin, and Victor C. M. Leung, "An Approach for Building Scalable Proxy Mobile IPv6 Domains," IEEE Trans. Netw., Vol. 8, No. 3, September 2011.
  5. I. Stoica, R. Morris, D. Liben-Nowell, D. Karger, M. Kaashoek, F.Dabek, and H. Balakrishnan, "Chord: a scalable peer-to-peer lookup protocol for Internet applications," IEEE/ACM Trans. Netw., vol. 11, no. 1, pp. 17-32, Feb. 2003. https://doi.org/10.1109/TNET.2002.808407
  6. D. Eastlake and P. Jones, "US secure hash algorithm 1 (SHA1)," IETF RFC 3174, Sep. 2001.
  7. D. R. Karger, E. Lehman, F. Leighton, M. Levine, D. Lewin, and R. Panigrahy, "Consistent hashing and random trees: distributed caching protocols for relieving hot spots on theWorldWideWeb," in Proc. 29th Annu. ACM Symp. Theory Comput., May 1997, pp. 654-663.
  8. A. Patel, K. Leung, M. Khalil, H. Akhtar, and K. Chowdhury, "Mobile node identifier option for mobile IPv6 (MIPv6)," IETF RFC 4283, Nov. 2005.
  9. L. R. Monnerat and C. L. Amorim, "D1HT: a distributed one hop hash table," in Proc. 20th IEEE International Parallel & Distributed Processing Symposium, Apr. 2006.
  10. Tao Zhou, Jing Xu, "Provable secure authentication protocol with anonymity for roaming service in global mobility networks"
  11. C.C. Chang, C.Y. Lee, Y.C. Chiu, Enhanced authentication scheme with anonymity for roaming service in global mobility networks, Computer Communications 32 (2009) 611-618. https://doi.org/10.1016/j.comcom.2008.11.032
  12. R. Koodli, "Fast handovers for mobile IPv6," IETF RFC 4068, July 2005.
  13. K.-S. Kong, W. Lee, Y.-H. Han, M.-K. Shin, and H. You, "Mobility management for all-IP mobile networks: mobile IPv6 vs. proxy mobile IPv6," IEEE Wireless Commun., vol. 15, no. 2, Apr. 2008.
  14. Q. B. Mussabbir, W. Yao, Z. Niu, and X. Fu, "Optimized FMIPv6 using IEEE 802.21 MIH services in vehicular networks," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3397-3407, Nov. 2007. https://doi.org/10.1109/TVT.2007.906987
  15. C. Bettstetter, H. Hartenstein, and X. Perz-Costa, "Stochastic properties of the random waypoint mobility model," Wireless Netw., vol. 10, no. 5, pp. 555-567, Sep. 2004. https://doi.org/10.1023/B:WINE.0000036458.88990.e5

Cited by

  1. Analytical Approach of Cross-Layer-Based Handoff Scheme in Heterogeneous Mobile Networks vol.13, pp.6, 2013, https://doi.org/10.7236/JIIBC.2013.13.6.1