Abstract
Mobile users need to maintain end-to-end connections when changing subnets. Handoff across networks often causes delay and loss of packets and make end users vulnerable to security threats that may lead to disruptions. In this paper, we design P-SIGMA , a delay and security-hardened, disruption-tolerant and signalling cost-effective end-to-end mobility management scheme by incorporating paging in SIGMA , an internet protocol diversity-based end-to-end transport layer mobility management scheme. P-SIGMA can detect and mitigate disruptions against two most common security threats: session hijacking and freeloading. We also propose a signalling cost analysis model for paging and a recovery-time model for attacks. To demonstrate performance improvement, we compare P-SIGMA with SIGMA and show the speed at which P-SIGMA can detect attacks (security breaches). We observe that P-SIGMA has lower signalling than SIGMA while maintaining all the benefits of a transport layer mobility management scheme. P-SIGMA can also detect paging related security threats with a small detection time without incurring any additional signalling.
Similar content being viewed by others
References
Atiquzzaman, M., & Reaz, A. (2005). Survey and classification of transport layer mobility management schemes. In: IEEE international symposium on personal indoor and mobile radio communications (PIMRC), Berlin, pp. 2109 – 2115.
Campbell, A., Castellanos, J., Kim, S., Valko, A., Wan, C., & Turanyi, Z. (2000). Design, implementation, and evaluation of cellular IP. IEEE Personal Communications, 7(4), 42–49.
Chatzimisios, P., Boucouvalas, A., & Vitsas, V. (2003) Packet delay analysis of IEEE 802.11 MAC protocol. IEE Electronics Letters, 39(18).
Cheung, H. (2006). How to crack WEP. Tech. rep., SmallNetBuilder, http://www.smallnetbuilder.com/content/view/24244/98/.
Chirumamilla, M., & Ramamurthy, B. (2003). Agent based intrusion detection and response system for wireless LANs. In: IEEE ICC, Seattle, WA, pp. 492–496.
Choi, T., Kim, L., Nah, J., & Song, J. (2004). Combinatorial mobile IP: A new efficient mobility management using minimized paging and local registration in mobile IP environments. Wireless Networks, 10(3), 311–321.
Wasserman, M., & Seite, P. (2011). Current practices for multiple interface hosts. IETF RFC 6419.
Eastlake, D.E. (1998). Secure domain name system dynamic update. IETF RFC 2267.
Fu, S., Atiquzzaman, M., Ma, L., & Lee, Y. (2005). Signaling cost and performance of SIGMA: A seamless handover scheme for data networks. Journal of Wireless Communications and Mobile Computing, 5(7), 825–845.
Fu, S., Ma, L., Atiquzzaman, M., & Lee, Y. (2005). Architecture and performance of SIGMA: A seamless handover scheme for data networks. In: IEEE ICC, Seoul.
Gallagher, M., & Snyder, R. (1997). Mobile telecommunications networking. NY: McGraw-Hill.
Gast, M. (2003). 802.11 wireless networks: The definitive guide. Sebastopol: O’Reilly Media, Inc.
Haverinen, H., & Malinen, J. (2000). Mobile IP regional paging. IETF Draft draft-haverinen-mobileip-reg-paging-00
Heine, G. (1998). GSM networks: Protocols, terminology, and implementation. Artech House.
IEEE of Computer Soceity, L.S.C. (2000).IEEE standard—local and metropolitan area networks—specific requirements—part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications: Higher-speed physical layer extension in the 2.4 GHz band. IEEE Std 802.11b-1999.
IEEE of Computer Soceity, L.S.C. (2005). IEEE standard—local and metropolitan area networks—specific requirements—part 3: Carrier sense multiple access with collision detection (csma/cd) access method and physical layer specifications. IEEE Std 802.3-2005.
Savolainen, T., Kato, J., & Lemon, T. (2012). Improved recursive DNS server selection for multi-interfaced nodes. IETF RFC 6731.
Johnson, D., Perkins, C., & Arkko, J. (2004). Mobility support in IPv6. IETF RFC, 3775.
Karygiannis, T., & Owens, L. (2002). Wireless network security. NIST Special Publication 800-48, National Institute of Standards and Technology.
Kempf, J. (2001). Dormant mode host alerting (IP paging) problem statement. IETF RFC, 3132.
Kirby, G. (1995). Locating the user. Communication International.
Koodli, R. (2005). Fast handovers for mobile ipv6. IETF RFC, 4068.
El Malki, K., Ed. (2007). Low latency handoffs in mobile IPv4. IETF RFC 4881.
Maltz, D. A., & Bhagwat, P. (1998). MSOCKS: An architecture for transport layer mobility. In: IEEE INFOCOM, San Francisco, CA, pp. 1037–1045.
Mockapetris, P. (1987). Domain name—implementation and specification. IETF RFC, 1035.
Navichai, A., & Benjapolakul, W. (2011). Two-step paging for reducing signaling costs in mobile IP. In: International conference on advanced communication technology. Seoul, pp. 50–55.
Perkins, C. (1998). Mobile networking through mobile IP. IEEE Internet Computing, 2(1), 58–69.
Perkins, C. (2002). IP mobility support. IETF RFC, 3344.
Ramjee, R., Porta, T. L., Salgarelli, L., Thuel, S., Varadhan, K., & Li, L. (2000). IP-based access network infrastructure for next-generation wireless data networks. IEEE Personal Communications, 7(4), 34–41.
Ramjee, R., Li, L., Porta, T., & Kasera, S. (2002). IP paging service for mobile hosts. Wireless Networks, 8(5), 427–441.
Reaz, A., Atiquzzaman, M., & Fu, S. (2005). Performance of DNS as Location Mamanger using random waypoint model. Technical report. TR-OU-TNRL-05-108, School of Computer Science, University of Oklahoma, http://www.cs.ou.edu/~netlab. Accepted for presentation in GlobeCom 2005
Reaz, A., Atiquzzaman, M., & Fu, S. (2005). Performance of DNS as Location Manager. In: IEEE electro/Information technology conference (EIT), Lincoln, NE, pp. 1–6.
Reaz, A., Atiquzzaman, M., & Fu, S. (2005). Performance of DNS as location manager for wireless systems in IP networks. In: IEEE GlobeCom, St. Louis, MO, pp. 359–363.
Reaz, A., & Atiquzzaman, M. (2006). P-SIGMA: Paging in end to end mobility management. In: IEEE ICC, Istanbul, pp. 1813–1818.
Reaz, A., Fu, S., Ferdousi, S., & Atiquzzaman, M. (2010). mSIGMA: An efficient handoff scheme for multiclass networks. IEEE Systems Journal, 4(2), 210–220.
Soliman, H., Castelluccia, C., Malki, K. E., & Bellier, L. (2005). Hierarchical Mobile IPv6 mobility management. IETF RFC, 4140.
Wolf, T., & Franklin, M. (2006). Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. In: ACM Australasian workshops on Grid computing and e-research, Hobart, Tasmania, pp. 221–230.
Xia, H., & Brustoloni, J. (2004). Detecting and blocking unauthorized access in Wi-Fi networks. In: International IFIP-TC6 networking conference.
Zhang, X., Castellanos, J., & Campbell, A. (2002). Design and performance of mobile IP paging. ACM Mobile Networks and Applications, 7(2), 127–141.
Author information
Authors and Affiliations
Corresponding author
Additional information
The research reported in this paper was funded by NASA Grant NAG3-2922.
Rights and permissions
About this article
Cite this article
Reaz, A., Roy, R. & Atiquzzaman, M. P-SIGMA : security aware paging in end-to-end mobility management scheme. Wireless Netw 19, 2049–2065 (2013). https://doi.org/10.1007/s11276-013-0550-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-013-0550-8