Skip to main content
Log in

P-SIGMA : security aware paging in end-to-end mobility management scheme

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Mobile users need to maintain end-to-end connections when changing subnets. Handoff across networks often causes delay and loss of packets and make end users vulnerable to security threats that may lead to disruptions. In this paper, we design P-SIGMA , a delay and security-hardened, disruption-tolerant and signalling cost-effective end-to-end mobility management scheme by incorporating paging in SIGMA , an internet protocol diversity-based end-to-end transport layer mobility management scheme. P-SIGMA can detect and mitigate disruptions against two most common security threats: session hijacking and freeloading. We also propose a signalling cost analysis model for paging and a recovery-time model for attacks. To demonstrate performance improvement, we compare P-SIGMA with SIGMA and show the speed at which P-SIGMA can detect attacks (security breaches). We observe that P-SIGMA has lower signalling than SIGMA while maintaining all the benefits of a transport layer mobility management scheme. P-SIGMA can also detect paging related security threats with a small detection time without incurring any additional signalling.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Atiquzzaman, M., & Reaz, A. (2005). Survey and classification of transport layer mobility management schemes. In: IEEE international symposium on personal indoor and mobile radio communications (PIMRC), Berlin, pp. 2109 – 2115.

  2. Campbell, A., Castellanos, J., Kim, S., Valko, A., Wan, C., & Turanyi, Z. (2000). Design, implementation, and evaluation of cellular IP. IEEE Personal Communications, 7(4), 42–49.

    Article  Google Scholar 

  3. Chatzimisios, P., Boucouvalas, A., & Vitsas, V. (2003) Packet delay analysis of IEEE 802.11 MAC protocol. IEE Electronics Letters, 39(18).

  4. Cheung, H. (2006). How to crack WEP. Tech. rep., SmallNetBuilder, http://www.smallnetbuilder.com/content/view/24244/98/.

  5. Chirumamilla, M., & Ramamurthy, B. (2003). Agent based intrusion detection and response system for wireless LANs. In: IEEE ICC, Seattle, WA, pp. 492–496.

  6. Choi, T., Kim, L., Nah, J., & Song, J. (2004). Combinatorial mobile IP: A new efficient mobility management using minimized paging and local registration in mobile IP environments. Wireless Networks, 10(3), 311–321.

    Article  Google Scholar 

  7. Wasserman, M., & Seite, P. (2011). Current practices for multiple interface hosts. IETF RFC 6419.

  8. Eastlake, D.E. (1998). Secure domain name system dynamic update. IETF RFC 2267.

  9. Fu, S., Atiquzzaman, M., Ma, L., & Lee, Y. (2005). Signaling cost and performance of SIGMA: A seamless handover scheme for data networks. Journal of Wireless Communications and Mobile Computing, 5(7), 825–845.

    Article  Google Scholar 

  10. Fu, S., Ma, L., Atiquzzaman, M., & Lee, Y. (2005). Architecture and performance of SIGMA: A seamless handover scheme for data networks. In: IEEE ICC, Seoul.

  11. Gallagher, M., & Snyder, R. (1997). Mobile telecommunications networking. NY: McGraw-Hill.

    Google Scholar 

  12. Gast, M. (2003). 802.11 wireless networks: The definitive guide. Sebastopol: O’Reilly Media, Inc.

    Google Scholar 

  13. Haverinen, H., & Malinen, J. (2000). Mobile IP regional paging. IETF Draft draft-haverinen-mobileip-reg-paging-00

  14. Heine, G. (1998). GSM networks: Protocols, terminology, and implementation. Artech House.

  15. IEEE of Computer Soceity, L.S.C. (2000).IEEE standard—local and metropolitan area networks—specific requirements—part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications: Higher-speed physical layer extension in the 2.4 GHz band. IEEE Std 802.11b-1999.

  16. IEEE of Computer Soceity, L.S.C. (2005). IEEE standard—local and metropolitan area networks—specific requirements—part 3: Carrier sense multiple access with collision detection (csma/cd) access method and physical layer specifications. IEEE Std 802.3-2005.

  17. Savolainen, T., Kato, J., & Lemon, T. (2012). Improved recursive DNS server selection for multi-interfaced nodes. IETF RFC 6731.

  18. Johnson, D., Perkins, C., & Arkko, J. (2004). Mobility support in IPv6. IETF RFC, 3775.

  19. Karygiannis, T., & Owens, L. (2002). Wireless network security. NIST Special Publication 800-48, National Institute of Standards and Technology.

  20. Kempf, J. (2001). Dormant mode host alerting (IP paging) problem statement. IETF RFC, 3132.

  21. Kirby, G. (1995). Locating the user. Communication International.

  22. Koodli, R. (2005). Fast handovers for mobile ipv6. IETF RFC, 4068.

  23. El Malki, K., Ed. (2007). Low latency handoffs in mobile IPv4. IETF RFC 4881.

  24. Maltz, D. A., & Bhagwat, P. (1998). MSOCKS: An architecture for transport layer mobility. In: IEEE INFOCOM, San Francisco, CA, pp. 1037–1045.

  25. Mockapetris, P. (1987). Domain name—implementation and specification. IETF RFC, 1035.

  26. Navichai, A., & Benjapolakul, W. (2011). Two-step paging for reducing signaling costs in mobile IP. In: International conference on advanced communication technology. Seoul, pp. 50–55.

  27. Perkins, C. (1998). Mobile networking through mobile IP. IEEE Internet Computing, 2(1), 58–69.

    Article  Google Scholar 

  28. Perkins, C. (2002). IP mobility support. IETF RFC, 3344.

  29. Ramjee, R., Porta, T. L., Salgarelli, L., Thuel, S., Varadhan, K., & Li, L. (2000). IP-based access network infrastructure for next-generation wireless data networks. IEEE Personal Communications, 7(4), 34–41.

    Article  Google Scholar 

  30. Ramjee, R., Li, L., Porta, T., & Kasera, S. (2002). IP paging service for mobile hosts. Wireless Networks, 8(5), 427–441.

    Article  MATH  Google Scholar 

  31. Reaz, A., Atiquzzaman, M., & Fu, S. (2005). Performance of DNS as Location Mamanger using random waypoint model. Technical report. TR-OU-TNRL-05-108, School of Computer Science, University of Oklahoma, http://www.cs.ou.edu/~netlab. Accepted for presentation in GlobeCom 2005

  32. Reaz, A., Atiquzzaman, M., & Fu, S. (2005). Performance of DNS as Location Manager. In: IEEE electro/Information technology conference (EIT), Lincoln, NE, pp. 1–6.

  33. Reaz, A., Atiquzzaman, M., & Fu, S. (2005). Performance of DNS as location manager for wireless systems in IP networks. In: IEEE GlobeCom, St. Louis, MO, pp. 359–363.

  34. Reaz, A., & Atiquzzaman, M. (2006). P-SIGMA: Paging in end to end mobility management. In: IEEE ICC, Istanbul, pp. 1813–1818.

  35. Reaz, A., Fu, S., Ferdousi, S., & Atiquzzaman, M. (2010). mSIGMA: An efficient handoff scheme for multiclass networks. IEEE Systems Journal, 4(2), 210–220.

    Article  Google Scholar 

  36. Soliman, H., Castelluccia, C., Malki, K. E., & Bellier, L. (2005). Hierarchical Mobile IPv6 mobility management. IETF RFC, 4140.

  37. Wolf, T., & Franklin, M. (2006). Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. In: ACM Australasian workshops on Grid computing and e-research, Hobart, Tasmania, pp. 221–230.

  38. Xia, H., & Brustoloni, J. (2004). Detecting and blocking unauthorized access in Wi-Fi networks. In: International IFIP-TC6 networking conference.

  39. Zhang, X., Castellanos, J., & Campbell, A. (2002). Design and performance of mobile IP paging. ACM Mobile Networks and Applications, 7(2), 127–141.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abu Reaz.

Additional information

The research reported in this paper was funded by NASA Grant NAG3-2922.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Reaz, A., Roy, R. & Atiquzzaman, M. P-SIGMA : security aware paging in end-to-end mobility management scheme. Wireless Netw 19, 2049–2065 (2013). https://doi.org/10.1007/s11276-013-0550-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-013-0550-8

Keywords

Navigation