The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
From a network perspective, the major challenge in providing seamless connectivity whilst maintaining the required level of QoS to users results from the negative interactions that occur between mobility and QoS. These interactions, particularly those of mobility and QoS, have been the subject of much research. In this paper, we discuss the various approaches that have already been taken to combine...
With the advent of various access technologies and increasing number of applications, a set of challenges concerning efficient delivery of ubiquitous services to heterogeneous users and devices have been posed. One of the important challenges is to integrate quality of service (QoS), security and mobility support in heterogeneous networks. To facilitate the interworking of these mechanisms we propose...
Delivering ubiquitous services to various users and devices through heterogeneous networks is a major aim in next generation networks. The delivery should be efficient and secure. The support and integration of security, quality of service (QoS) and mobility management (MM) in access networks become parts of the essential issues. An enhanced node (EN) with a network sub-layer is proposed here to achieve...
This paper proposes a novel secure binding management protocol for mobile IPv6 networks for use in the implementation of routing optimization. The idea uses the public key of the home network of a mobile node to cryptographically generate the mobile node's home address and the associated private key to sign the mobile node's authentication requests. In addition, the proposed protocol performs reachability...
Mobile business (m-business) could be described as the utilization of mobile technologies to maintain, improve or extend existing business processes. It is allowing people to make the best use of business opportunities. However, most of the current m-business models are simply an extension of traditional e-business models to support wireless networks. Being not designed for mobile applications essentially,...
Most solutions focus on the home network security server management and gateway device certification. It is unrealistic where the most subjects are mobile users who want to control home network devices. Therefore minor and fast certification structures are needed to control other devices with mobile device that has lower computing capacity. To solve the above problems, this paper wants to build safe...
Enhanced route optimization for mobile IPv6 applies cryptographically generated addresses (CGAs) to improve security and reduce handover delays. However the use of CGAs requires computationally expensive algorithms. This may be an issue for small mobile devices with low processing power. It is a problem for correspondent nodes that simultaneously communicate with a large number of mobile nodes, such...
The proposed architecture is structured into a secure API, a backbone, and separate device networks with standard interface to the backbone. The API decouples innovation of services and service logic from protocols and network elements. It also enables service portability between systems, i.e. a service may be allocated to end-systems or servers, with possible relocation and replication throughout...
Mobile ad hoc networks remove the dependence on a fixed network infrastructure by treating every available mobile node as an intermediate switch, thereby extending the range of mobile nodes well beyond their base transceivers. Since routing is the backbone of any mobile ad hoc communication, thus if there occur any flaws in the routing, the whole of the communication would come down to a stand still...
IP over TETRA is a solid and robust platform for secure and reliable data communications in the field of public safety and in for other PMR applications. In the paper the basic concepts of WAP application over TETRA network are presented. WAP over TETRA trial architecture is shown and an example of Web application ldquodangerous goodsrdquo is demonstrated. TETRA enhanced data services offered by TETRA...
Several solutions have been proposed to couple QoS with mobility management in a way that can satisfy the real-time requirements. The most of these solutions depend on RSVP which suffers from many drawbacks. "Next Step In Signaling" protocol suite (NSIS) presents a new promised framework that can be used to signal for different QoS models and cover the drawbacks of RSVP. This paper proposes...
The IPv6 network protects the IP layer by using the IPSec protocol and the SEND mechanism. However each host should be authenticated repeatedly when the two mechanisms are used at the same time. In this paper, we propose a cooperation scheme to share the authentication information between the SEND mechanism and the IPSec protocol. By sharing the authentication data of the host with the SEND mechanism,...
Mobile IP ensures the seamless IP connectivity while roaming but it also introduce deficiencies in terms of processing overhead. Proxy mobile IP (PMIP) has been proposed to solve the challenge of IP mobility. Network-based mobility support removes the involvement of mobile node (MN) by introducing new mobility entities, local management anchor (LMA) and mobility access gateway (MAG). This paper presents...
Neighbor Discovery protocol can be used to communicate between neighboring nodes in the MobileIPv6 environment. For a secure Neighbor Discovery protocol, the IETF SEND working group standardized a Secure Neighbor Discovery protocol, and a Cryptographically Generated Address protocol. Neighbor Discovery protocol can be provided with secure functions by adding the RSA signature option and the CGA parameter...
In mobile IPv6, the location of a mobile node (MN) is obtained by implementing a binding update (BU) process. During the process, the unauthenticated BU message may give rise to many security risks, such as denial-of-service (DoS) attack. Thus, authentication of the BU message is most important for the security of mobile IPv6. The purpose of cryptographically generated addresses (CGA) is to prevent...
Todaypsilas Internet architecture faces many challenges, especially the poor support for security and universal services. By analyzing the drawbacks of current TCP/IP protocol and related research schemes such as HIP and FARA, we propose a trustworthy universal network architecture model LISNA, which is based on locator/identity split. LISNA defines the network architecture by introducing a new kind...
This paper deals with the problem of security aspects in future mobile networks. Security is important to be recognized in mobile networks for current and future users and implements. In the first par of this presentation, security concepts together with infrastructure security are presented. Five security features groups are emphasized. The second part treats the problem of security context together...
Mobile IP is used to manage the mobility of the Internet mobile users, and to keep their connectivity while they move from place to place. The security of mobile IP considering can be divided into two aspects, first in registration process, second, when connected parties exchange data with each other. In this article, after a brief study on the existing approaches used for securing mobile IP connections...
The rapid spread of IP-based Access technologies and the move towards Core Network Convergence with IMS has led to an explosion in multimedia content delivery across packet networks. IMS provides mobile and multimedia services to the customer along with fixed networks support leading to mobile and fixed convergence. The use of open standard IP protocols, defined by the IETF, allows IMS to easily introduce...
The IP Multimedia Subsystem (IMS) has emerged as next generation value added communication services including mobile multimedia broadcasting, multimedia conferencing, push to talk and presence etc on top of all IP networks. Offering multimedia streaming services across heterogeneous fixed and mobile networks have faced many challenges e.g. security, QoS, mobility and services management. In this article...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.