TITLE

Tested Evaluation of Fast and Secure Handover in FMIPv6

AUTHOR(S)
Khan, Shoaib; Loo, K. K.; Kiani, A. K.
PUB. DATE
April 2010
SOURCE
International Journal of Communication Networks & Information Se;Apr2010, Vol. 2 Issue 1, p60
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In next generation all-IP based networks, a large number of mobile nodes are expected to use MIPv6 protocol for mobility. In mobile environment one frequent cause of service disruption is handovers. When MN moves, at some point MN will reach the physical border of its current wireless network and will enter an area covered by another wireless network. In such a situation, MN must switch to the new wireless network by handover. Fast handover for MIPv6 (FMIPv6) has been developed as an extension protocol to reduce the handover latency and packet loss inherent with MIPv6. The RFC4068 for FMIPv6 is categorized as "Experimental" by IETF because it is not in compliance with MIPv6 standard. One major compliance issue is that MIPv6 requires that all the messages exchanged between MN and HA should be secured. Adding security mechanism to MIPv6 without significant delay to the overall protocol performance is a challenge itself and it is recognized by IETF's "mishop" working group. This paper presents a modified FMIPv6 which has the security mechanism in-line with the MIPv6 standard. The proposed FMIPv6 protocol is secured without introducing any significant handover latency reduction. This work was part of FP6 project ENABLE, and the actual testbed was presented in projects final demonstration meeting at Telecom Italia (T.I.) Labs in Turino.
ACCESSION #
49005553

 

Related Articles

  • Network capacity growth demands new solutions. Melle, Serge // Laser Focus World;Oct2006, Vol. 42 Issue 10, p113 

    The article focuses on the growth in Internet-protocol (IP) core network capacity. This growth in IP network bandwidth has driven the need to scale direct router-to-router connectivity to handle Internet traffic volumes. In addition, this network growth rates poses challenges to operators who...

  • A Low-Storage Precise IP Traceback Technique Based on Packet Marking and Logging. FADEL, MAGDY M.; EL-DESOKY, ALI I.; HAIKEL, AMIRA Y.; LABIB, LABIB M. // Computer Journal;Nov2016, Vol. 59 Issue 11, p1581 

    IP traceback techniques are used to defend against DDoS attacks, and two of the most preferred techniques are packet marking and packet logging. Marking techniques differentiate between attacks and legitimate packets incur little computation overhead while requiring a large flow of packets to...

  • ID/Locator Split-Based Distributed Mobility Management Mechanism. Kafle, Ved; Fukushima, Yusuke; Harai, Hiroaki // Wireless Personal Communications;Jun2014, Vol. 76 Issue 4, p693 

    We have designed the heterogeneity inclusion and mobility adaptation through locator ID separation (HIMALIS) architecture to support mobility natively in the New Generation Network. This paper proposes a new distributed mobility scheme in the HIMALIS architecture for supporting seamless mobility...

  • Implementation of Vertical Handoff in Heterogeneous Networks. Nawaz, Sadaf; Cheema, Saman; Akram, Sana; Shehzad, K.; Abbas, S. Muzahir // International Journal of Future Generation Communication & Netwo;Sep2012, Vol. 5 Issue 3, p11 

    Vertical Handoff (VHO) is a major concern for different heterogeneous networks. VHO can be user requested or based on some criteria already designed by the researcher of that particular algorithm. It's about switching from one network to another while maintaining the session. Numerous algorithms...

  • Minimization of Handoff Failure Probability for Next-Generation Wireless Systems. Sarddar, Debabrata; Jana, Tapas; Saha, Souvik Kumar; Banerjee, Joydeep; Biswas, Utpal; Naskar, M. K. // International Journal of Next-Generation Networks;Jun2010, Vol. 2 Issue 2, p36 

    During the past few years, advances in mobile communication theory have enabled the development and deployment of different wireless technologies, complementary to each other. Hence, their integration can realize a unified wireless system that has the best features of the individual networks....

  • A Look Forward into LTE. Botka, Andy // Microwave Journal;Nov2008 Wimax LTE Supplement, p6 

    The article discusses topics related to long term evolution (LTE) in the U.S. It states that LTE is the project name of new air interface for wireless access being developed by the Third Generation Partnership Project (3GPP). According to the article, its aim is to evolve 3GPP's third generation...

  • Mobility Management in Identifier/Locator Split Networks. Qiu, Feng; Li, Xiaoqian; Zhang, Hongke // Wireless Personal Communications;Sep2012, Vol. 65 Issue 3, p489 

    In the traditional Transmission Control Protocol/Internet Protocol (TCP/IP) stack, IP address represents not only the identifier but also the location of a node so that it can not provide global roaming seamless. To address this problem, MIP (Mobile IP) uses dynamical care-of-address to indicate...

  • QoS Provisioning in Wireless Body Area Networks: A Review on MAC Aspects. Anup Thapa; Seokjoo Shin // KSII Transactions on Internet & Information Systems;May2012, Vol. 6 Issue 5, p1267 

    Wireless Body Area Networks (WBANs) deal with variety of healthcare services with diverse Quality of Service (QoS) requirements. However, QoS handling is a challenging problem in such networks. In general, QoS related problems can be addressed from different layers in the networking protocol...

  • Managing IP networks. Brown, Russell // Broadcast Engineering;May2010, Vol. 52 Issue 5, p32 

    The article discusses ways on how to manage Internet protocol (IP) networks. It mentions that using route analytics software in IP allows the manager to monitor the condition of his network. It also mentions Internet security including the use of a firewall to protect unwanted users and network...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics