Abstract
To reduce the amount of the signaling messages occurred in movement, Hierarchical Mobile IPv6 (HMIPv6) has been introduced as the hierarchical mobility management architecture for MIPv6 by regarding the micro movement. When approaching the visited link, the authentication procedure should be done successfully prior to any mobility support message exchanges. The Authentication, Authorization and Account (AAA) authentication service is applied gradually to the wireless LAN(Local Area Network) and Cellular networks. However, it may bring about the service latency for the sessions of needing the real-time processing due to not providing the optimized signaling in local and frequent movements. In this paper, we propose the authentication architecture with ‘delegation’ scheme to reduce the amount of signaling message and latency to resume for local movements by integrating it with HMIPv6 architecture. We provide the integrated authentication model and analyze materials comparing to the exiting authentication scheme. It cuts down the cost to 33.6% at average measurement.
This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Soliman, H., Castelluccia, C.: Hierarchical Mobile IPv6 mobility management(HMIPv6). IETF Internet Draft, Mobile IP Working Group (June 2003)
Mankin, A., Patil, B., Harkins, D., Nordmark, E., Nikander, P., Roberts, P., Narten, T.: Threat Model introduced by Mobile IPv6. Internet Draft IETF (May 2001)
Dupont, F., Bournelle, J.: AAA for Mobile IPv6. Internet Draft, IETF (November 2001)
Kim, M., Mun, Y., Nah, J., Sohn, S.: Localized Key Management for AAA in Mobile IPv6. IETF Internet Draft, Mobile IP Working Group (October 2002)
Calhoun, P.R., Guttman, E., Arkko, J.: Diameter Base Protocol. Internet Draft, IETF (July 2002)
Le, F., Patile, B., Perkins, C.E.: Diameter Mobile IPv6 Application. Internet Draft, IETF (November 2001)
Kleinrock, L.: Queueing Systems. Theory, vol. 1. John Wiley & Sons, Chichester (1975)
Chiang, K., Shenoy, N.: A Random Walk Mobility Model for Location Management in Wireless Network. In: Proc. IEEE PIMRC Conf. (September 2001)
Pack, S., Choi, Y.: Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks. In: Proc. IEEE PIMRC Conf. Beijing (September 2003)
Maple, W.: Computing the Steady-State Vector of Markov Chain (2001), www.mapleapps.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, M., Kim, M., Mun, Y. (2005). A Hierarchical Authentication Scheme for MIPv6 Node with Local Movement Property. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424758_57
Download citation
DOI: https://doi.org/10.1007/11424758_57
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25860-5
Online ISBN: 978-3-540-32043-2
eBook Packages: Computer ScienceComputer Science (R0)