The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Existing wireless networks typically support mobility by routing via a mobility anchor in a home network, but such via routing can result in non-optimized routes. This paper proposes a method to distribute the functions of the mobility anchor to different networks to avoid such non-optimized routes. It proposes a distributed mobility anchors architecture consisting of home mobility anchors (H-MA)...
The current Internet architecture is facing serious scaling problems notably in its routing and addressing system. Also due to the overloaded semantic of the IP address, the current Internet architecture cannot inherently support mobility and multihoming. To solve these problems, different Locator Identity Spilt solutions have been proposed. However most of these solutions tend to focus only on part...
Seamless mobility across heterogeneous wireless networks requires a certain level of Quality of Service (QoS) to be assured as it determines the packet loss and delay during handoff procedure. Selecting the target network in an appropriate time plays a crucial role towards achieving ubiquitous networks. This paper proposes a network discovery and selection method called Improved Access Router Discovery...
At present, many studies focus on the efficiency of handoff among different networks, while research on how to maintain the safety during registration process of handoff is not enough. Unfortunately, mobile node is vulnerable to various security threats and attacks when handover for being lack of protection. A security scheme based on the IPSec protocol which was combined with fast handoff signaling...
MIPv6 is one of the dominating protocols that enable a mobile node to maintain its connectivity to the Internet when moving from one access router to another. However, it suffers from long handoff latency and routing inefficiency. In this paper, we present a novel distributed mobility management scheme, ADA (Asymmetric Double-agents Architecture), which introduces two mobility agents to serve one...
Proxy Mobile IPv6 (PMIPv6) is designed to provide mobility service to IPv6-nodes in a network domain by network-based management which does not require the nodes to be involved in IP mobility management. In other words, the PMIPv6 can support roaming within a PMIPv6 domain, i.e. intra-domain roaming, transparent to mobile nodes. Recently, next generation wireless networks, such as 802.16e and Super...
In the Internet, nodes are identified using IP addresses that depend on their topological location. IPv4/IPv6 translation technology involves address mapping between IPv6 and IPv4 nodes and the methods used to translate protocols, where nodes are in their respective IP version of network. A detailed study is made on the IPv6 addressing architecture, various IPv6 configuring mechanisms and obtaining...
Media-Independent Pre-Authentication (MPA) is used as a secure handover optimization scheme working over any link layer. With MPA, a mobile node (the MN) can establish a security association with a candidate target network (CTN), obtain an IP address and other parameters from the CTN, and complete the binding update of any mobility management protocol with the new care-of address (nCoA) before performing...
Mobile multicast becomes a research hotspot with the development of wireless and mobile technologies, and it is based on the traditional multicast protocols and mobility management protocols to provide the multicast services for mobile subscribers. Several mobile multicast methods were proposed in the past few years, but most of them are based on the mobile IPv6 and its alternatives which require...
With the development of mobile technologies several mobile multicast methods were proposed, but most of them are based on the host-based mobility support specifications such as Mobile IPv6 (MIPv6) which require the mobile hosts to support the mobility function. Recently, the Proxy Mobile IPv6 (PMIPv6) was proposed to provide the mobility support for mobile node without mobility function, and the previous...
When a mobile node roams in the mobile networks, its access router and routing path keeps changing. Hence the mobile node needs to authenticate the new access router and establish a new key for secure communication. To this motivation, this paper proposes a lightweight, efficient and scalable protocol to establish and update the authentication key in the mobile IPv6 networks.
Push protocols are attractive for WSNs if sensor information is expected to be sent frequently. However, node compromise and changing routes in a WSN pose a security challenge in the design of a push service as the service may be misused for path-based denial of service (PDoS) attacks. In this paper, we propose push protocols resilient against PDoS attacks which also cope with the dynamics of WSNs.
Control signaling messages in mobile IPv6 are mainly used to inform the home agent (HA) and the correspondent node (CN) about the mobile node's (MN's) new address when its network attachment point is changed. In order to prevent various attacks, such as man-in-the-middle and denial-of-service attacks, these messages must be protected. Protocols based on Identity-Based Encryption (IBE) for protecting...
To improve the local mobility performance of a wireless network, we present a new framework, namely Efficient Framework for Local Mobility (EFLoM). In EFLoM, we introduce three entities: Local Anchor Router (LAR), Wireless Access Gateway (WAG) and Mobile Node (MN). LAR is a router that is in charge of MN's IP mobility management. It keeps track of MN's movement, and delivers the MN's packets to its...
It supports only one mobile terminal to roam in wireless network using mobile IP technology. We extend one terminal to a small network, and propose ldquoroaming subnetrdquo to support network roaming while keeping data connection with huge network. In a roaming subnet, home agent, foreign agent and intra-domain routing agent cooperate instead of traditional MAC level device. Mobile node in subnet...
This paper aims at solving the following two problems about the standard Mobile IP protocol: the reduction of network payload throughput and the packets loss when plenty of mobile nodes move between domains frequently. The paper puts forward an intelligent mobile IP routing algorithm based on the active network. By using the mechanism of tree-based sending the binding update packets and the packets...
Data aggregation has been proposed as one method for reducing energy consumption in sensor networks. One critical factor in data aggregation is routing. In this paper, we generalize the present routing schemes and find that they are all static and thus cannot change when data packets flowing to sink. To make data aggregation more efficient, we design data aggregation protocol based on dynamic routing...
Localized mobility protocols are designed to address many of the drawbacks such as additional signaling and over-the-air tunnel overhead associated with global mobility protocols like Mobile IPv4 and Mobile IPv6. Proxy Mobile IPv6 is one such network controlled localized protocol defined in the IETF Although Proxy Mobile IPv6 can resolve longer binding update and tunnel overhead related issues when...
Inter-technology roaming is known as one of the interesting challenges toward fourth generation of mobile and wireless communication. While FMIPv6 standardizes the fast handoff solutions in IP layer, the issues of media independency are being investigated through IEEE802.21 project. The integration of these two standards is believed to result in solutions for vertical handoffs between different network...
IETF has proposed mobile IPv6-based network mobility (NEMO) basic support protocol (BSP) to support network mobility. NEMO BSP inherits all the drawbacks of mobile IPv6, such as inefficient routing path, single point of failure, high handover latency and high packet overhead. To address these drawbacks, a new network mobility scheme, called seamless IP-diversity based network mobility (SINEMO), has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.