[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1641804.1641823acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Improving security information gathering with IEEE 802.21 to optimize handover performance

Published: 26 October 2009 Publication History

Abstract

In mobile networks, authentication is a time-consuming operation that needs to be shortened in order to provide seamless handovers. Furthermore, the time required for negotiating security parameters and obtaining security policies increases the importance of the authentication performance during handovers. Many optimizations have been proposed for different authentication mechanisms in different layers. However, they fail to provide means to learn in advance security capabilities and policies in candidate networks, and thus do not reduce the chance of connecting to potentially incompatible target networks. In this paper we use the information capabilities provided by IEEE 802.21 and propose an extension to current network selection algorithms that takes into account security parameters and policies to optimize the handover performance and reduce the negotiation delay.

References

[1]
The Network Simulator NS-2, version 2.31. http://nsnam.isi.edu/nsnam/index.php/Main Page.
[2]
IEEE draft 802.21/d14. IEEE draft standard for local and metropolitan area networks - part 21: Media independent handover services. IEEE Draft 802.21/D14, Sept. 2008.
[3]
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz. Extensible Authentication Protocol (EAP). RFC 3748 (Proposed Standard), June 2004. Updated by RFC 5247.
[4]
B. Aboba, D. Simon, and P. Eronen. Extensible Authentication Protocol (EAP) Key Management Framework. RFC 5247 (Proposed Standard), Aug. 2008.
[5]
M. Boulmalf, E. Barka, and A. Lakas. Analysis of the effect of security on data and voice traffic in wlan. Computer Communications, 30(11-12):2468--2477, 2007.
[6]
A. Dutta, V. Fajardo, Y. Ohba, K. Taniuchi, and H. Schulzrinne. A framework of media-independent pre-authentication (mpa) for inter-domain handover optimization. Internet-Draft, July 2007.
[7]
T. Ghebregzisabher, J. Puttonen, T. Hamalainen, and A. Viinikainen. Security analysis of flow-based fast handover method for mobile IPv6 networks. In 20th International Conference on Advanced Information Networking and Applications (AINA) 2006., volume 2, pages 849--853, Apr. 2006.
[8]
V. P. Kafle, E. Kamioka, and S. Yamada. Extended correspondent registration scheme for reducing handover delay in mobile IPv6. In 7th International Conference on Mobile Data Management (MDM) 2006., pages 110--110, May 2006.
[9]
H.-S. Kang and C.-S. Park. Authenticated fast handover scheme in the hierarchical mobile IPv6. In J.-K. Lee, O. Yi, and M. Yung, editors, WISA, volume 4298 of Lecture Notes in Computer Science, pages 211--224. Springer, 2006.
[10]
M. Kassab, J. M. Bonnin, and A. Belghith. Fast and secure handover in WLANs: An evaluation of the signaling overhead. In 5th IEEE Consumer Communications and Networking Conference CCNC 2008., pages 770--775, Jan. 2008.
[11]
R. Koodli. Mobile IPv6 Fast Handovers. RFC 5268 (Proposed Standard), June 2008.
[12]
M. Nakhjiri. Use of EAP-AKA, IETF hokey and AAA mechanisms to provide access and handover security and 3g-802.16m interworking. In IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2007., pages 1--5, Sept. 2007.
[13]
V. Narayanan and L. Dondeti. EAP Extensions for EAP Re-authentication Protocol (ERP). RFC 5296 (Proposed Standard), Aug. 2008.
[14]
NIST. Seamless and Secure Mobility project. http://www.antd.nist.gov/seamlessandsecure.shtml, Oct. 2008.
[15]
S.-J. Yoo, D. Cypher, and N. Golmie. LMS predictive link triggering for seamless handovers in heterogeneous wireless networks. In IEEE Military Communications Conference MILCOM 2007., pages 1--7, Oct. 2007.

Cited By

View all
  • (2013)A Survey on Context-Aware Mobile and Wireless Networking: On Networking and Computing Environments' IntegrationIEEE Communications Surveys & Tutorials10.1109/SURV.2012.040912.0018015:1(362-386)Online publication date: Sep-2014
  • (2012)Developing Tools for Parsing ns-2 Results: IEEE802.21 Case ScenarioMobile Multimedia Communications10.1007/978-3-642-35155-6_28(347-358)Online publication date: 2012
  • (2010)Simulation of 802.21 handovers using ns-2Journal of Computer Systems, Networks, and Communications10.1155/2010/7947492010:S2(1-7)Online publication date: 1-Jan-2010

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MSWiM '09: Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
October 2009
438 pages
ISBN:9781605586168
DOI:10.1145/1641804
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 October 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IEEE 802.21
  2. handover
  3. security configuration

Qualifiers

  • Research-article

Conference

MSWiM '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 398 of 1,577 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2013)A Survey on Context-Aware Mobile and Wireless Networking: On Networking and Computing Environments' IntegrationIEEE Communications Surveys & Tutorials10.1109/SURV.2012.040912.0018015:1(362-386)Online publication date: Sep-2014
  • (2012)Developing Tools for Parsing ns-2 Results: IEEE802.21 Case ScenarioMobile Multimedia Communications10.1007/978-3-642-35155-6_28(347-358)Online publication date: 2012
  • (2010)Simulation of 802.21 handovers using ns-2Journal of Computer Systems, Networks, and Communications10.1155/2010/7947492010:S2(1-7)Online publication date: 1-Jan-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media