The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on...
In response to the emerging deployment of IPv6 on network devices, this paper proposes the integration of IPv6 on Lock-Keeper, an implementation of a high level security system for preventing online attacks. It is designed to permit the secure data exchange over physically separated networks in an IPv4-based environment. A new intercommunication module is added to manage IPv4/IPv6 handoff inside the...
In this paper, we propose a Seamless and Secure service Framework (SSF) which guarantees secure association between user's terminal and safety critical system such as payment gateway by exploiting both user information and network information. Despite the leaks of personal sensitive information, SSF provides very safe service environment in wired and wireless convergence network that vertical handover...
The provision of NEMO support based on an end-to-end protocol presents manageability challenges that are usually overcome delegating the signaling rights to the MR. In addition, whether the protocol is focused on establishing security associations, how these are rekeyed through a proxy-based process with no security threats should be solved. In this work we focus on the HIP protocol and analyze existing...
Host Identity Protocol (HIP) has security support to enable secured mobility and multihoming, both of which are essential for future Internet applications. Yet micro-mobility has not been efficiently and securely addressed by HIP and other mechanisms based on it. This paper introduces a method based on HIP to support micro-mobility in an efficient and secure manner. We present the architectural elements...
SCTP is a transport protocol which provides new interesting features such as multi-homing and multi-streaming. To support the multi-homing characteristic of SCTP, the service level negotiation protocols have to be updated. In this paper, we propose an extension of the Service Level Negotiation Protocol (SLNP) in order to enable service offer negotiation for SCTP-based applications. We propose also...
Due to the underlying dynamic nature of wireless and ad-hoc communication environments, applications in tactical networks have to cope with network disconnections and communication channel degradations. Support for network migration, i.e., the ability of a node to seamlessly change its network attachment point without disrupting service sessions, is therefore essential to provide seamless connectivity...
With the rapid growth of wireless communication technologies and mobile applications, more and more mobile terminals need to access Internet seamlessly. Due to the IP address acts as both identifier and locator for a mobile terminal, it cannot guarantee the service continuity when a mobile terminal keeps moving. An efficient mobility management schemes for a mobile terminal is important. The Host...
The growing demand for ubiquitous computing lead manufactures to develop multi-band devices supporting different network access technologies, such as GSM, Wi-fi, and UMTS. Although these devices support different access technologies, they lack of native vertical handover support, breaking any ongoing connections whenever users switch between access technologies. In this paper we present a next-generation...
Mesh technology has captured the interest of university research and industry, because of its capacity to meet at the same time the requirements of suppliers of wireless access to Internet and of users. But, the architecture and the configuration of this type of network do not ensure a protection against the unauthorized use of the network since the basic security measures used do not include the...
One of the major challenges for Real-time applications over next-generation heterogeneous networks is the seamless vertical handoff. These applications require fast and efficient handover that realize service continuity and seamless mobility preserving the security and the QoS. In this paper we propose a new seamless vertical handover solution performing fast authentication while guaranteeing the...
The evolution of Internet and its hosts does not match anymore the current Internet architecture, designed when mobility, multihoming and security were not considered, and based on IP addresses with the double role of host's identity and host's topological location. In this paper we propose a secure global and localized mobility management scheme suitable for multihomed Mobile Nodes (MNs) and based...
Fast handover management in mobile IPv6 environments has been a research subject for a long time. Exploiting the cooperative diversity paradigm in partner-based hierarchical MIPv6 (PHMIPv6) promises an acceleration of the handoff management operation by relaying some signaling over a selected partner node prior to the actual handover to the new access point. For this purpose, a suitable partner node,...
Together with the IMO's future navigation system implementation strategy, the e-navigation, wireless access technologies are proliferating on the maritime scenario, covering last mile communications. In the near future, we foresee that communication technologies will coexist and will be available in overlapping areas through the maritime last mile. Therefore, in order to enhace ship-shore communications,...
The Fast Handovers for Mobile IPv6 (FMIPv6) protocol was developed from the experience of MIPv6 and the facilities provided by link layer triggers, allowing for a proactive approach to handover that minimises packet exchange delay and packet loss. After handover, the mobile node may carry out Return Routability with the correspondent node(s) for route optimization. However, this method leaves scope...
In PMIPv6, We propose a new Route Optimization (RO) scheme with roaming among the inter-domains. Previous works are used direct packet forwarding methods among the Mobile Access Gateways (MAGs) because the MAG manages the signaling for the mobile nodes (MNs) to support the mobility. However, previous works cause a lot of problems in security, packet delivery latency, and increasing the control messages...
Efficient, seamless and secure handover for mobile nodes in overlay heterogeneous networks is a main goal of mobility management. Mobility management can be classified into macro-mobility and micro-mobility management. The former handles the movement of a node between any two IP addresses and the later focuses on the handover between different access points within a single domain. Host Identity Protocol...
The IP multimedia subsystem is a basis for a significant new architecture which offers network operators the opportunity to expand their services, integrating voice and multimedia communications and delivering them into new environments with new purposes. The IMS is an overlay network on top of IP that uses SIP as the primary signaling mechanism. Using IMS bears several new security challenges. In...
With the evolution and proliferation of the All-IP core network and the mobile access network, more and more legacy services are being transferred to the converged and unified IP-based platform. For this transfer, SIP (Session Initial Protocol) has been adopted by IETF, ETSI, and 3GPP for creating, modifying, and terminating multimedia sessions. SIP with application-level mobility support can replace...
The combination of SIP-NEMO and IMS brings benefits of power saving, low complexity and few handoff to both end users and service providers. In this article we investigate the integration of SIP-NEMO in the IMS, and propose two interworking architectures: loosely coupled and tightly coupled. We also present three basic scenarios: registration, session establishment and optimized handoff with context...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.