Skip to main content
Log in

Performance analysis of signalling overhead in Host Identity Protocol-based secure mobile networks: Ultra Flat Architecture or end-to-end signalling?

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

This paper evaluates the performance overheads of two Host Identity Protocol-based signalling schemes controlling internet protocol connectivity establishment and handover procedures in distributed mobile networks. The paper proves using an analytical model that the Ultra Flat Architecture has significant performance gains on user side, in the access networks and at the rendezvous service over the terminal-based architecture due to the application of delegation of signalling rights. On the other hand, the former architecture results in greater overhead in the transport network connecting the gateways and at the gateways. The results also provide guidance on the optimal setting of protocol lifetime parameters, maximum delegation authorization certificate chain length and distribution level of gateways in both schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26

Similar content being viewed by others

References

  1. Cisco. (2014). Cisco visual networking index: Global mobile data traffic forecast update, 2013–2018. White Paper.

  2. Daoud, K., Herbelin, P., & Crespi, N. (2008). UFA: Ultra Flat Architecture for high bitrate services in mobile networks. In Proceedings of the IEEE 19th international Symposium on personal, indoor and mobile radio communications (PIMRC), Cannes, France. doi:10.1109/PIMRC.2008.4699577.

  3. Faigl, Z., Bokor, L., Neves, P., Daoud, K., & Herbelin, P. (2011). Evaluation of two integrated signalling schemes for the Ultra Flat Architecture using SIP, IEEE 802.21, and HIP/PMIP protocols. Computer Networks, 55(7), 1560–1575.

    Article  Google Scholar 

  4. Bokor, L., Faigl, Z., & Imre, S. (2010). A delegation-based HIP signaling scheme for the ultra flat architecture. In Proceedings of the 2nd international workshop on security and communication networks (IWSCN’10), Karlstad, Sweden. doi:10.1109/IWSCN.2010.5498001.

  5. Nikander, P., Gurtov, A., & Henderson, T. (2010). Host identity protocol (HIP): Connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks. IEEE Communications Surveys & Tutorials, 12(2), 186–204.

    Article  Google Scholar 

  6. Jokela, P., Moskowitz, R., & Nikander, P. (2008). Using the encapsulating security payload (ESP) transport format with the host identity protocol (HIP). IETF RFC 5202.

  7. Moskowitz, R., et al. (2008). Host identity protocol. IETF RFC 5201.

  8. IEEE. (2009). IEEE standard for local and metropolitan area networks—part 21: Media independent handover. IEEE Std 802.21-2008.

  9. Moskowitz, R. (2012). HIP Diet EXchange (DEX). IETF Draft, draft-moskowitz-hip-rg-dex-06.

  10. Faigl, Z., Bokor, L., Pellikka, J., & Gurtov, A. (2013). Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core. Computer Networks, 57(17), 3370–3388.

    Article  Google Scholar 

  11. Faigl, Z., & Telek, M. (2014). Modeling the signaling overhead in host identity protocol-based secure mobile architectures. Journal of Industrial and Management Optimization (JIMO) (in press).

  12. 3GPP. (2012). Security Aspects of non-3GPP Accesses (Release 11). 3GPP TS 33.402.

  13. Loughney, J., Nakhjiri, M., Perkins, C., & Koodli, R. (2005). Context transfer protocol (CXTP). IETF RFC 4067.

  14. Nikander, P., & Arkko, J. (2004). Delegation of signalling rights. In B. Christianson, B. Crispo, J. A. Malcolm, & M. Roe, (Eds.), Security protocols, Springer lecture notes in computer science, (Vol. 2845, pp. 575–586).

  15. Herborn, S., Huber, A., Boreli, R., & Seneviratne, A. (2007). Secure host identity delegation for mobility. In Proceedings of the 2nd international conference on communication systems software and middleware (COMSWARE), Bangalore, India. doi:10.1109/COMSWA.2007.382596.

  16. Allard, F., & Bonnin, J.-M. (2008). An application of the context transfer protocol: IPsec in a IPv6 mobility environment. International Journal of Communication Networks and Distributed Systems, 1(1), 110–126.

    Article  Google Scholar 

  17. Allard, F., et al. (2008). Security analysis and security optimizations for the context transfer protocol. In Proceedings of the 2nd IFIP international conference on new technologies, mobility and security (NTMS), Tangier, Morocco. doi:10.1109/NTMS.2008.ECP.87.

  18. Allard, F., et al. (2008). IKE context transfer in an IPv6 mobility environment. In Proceedings of the 3rd international workshop on mobility in the evolving onternet architecture (MobiArch). doi:10.1145/1403007.1403020.

  19. Almesberger, W. (2004). TCP connection passing. In Proceedings of the linux symposium, Ottawa, Canada (Vol. 1, pp. 1–13).

  20. Farahbakhsh, R., & Movahhedinia, N. (2008). Using context transfer mechanisms to Improve Mobile IMS-IPv6 Handover Latency and QoS provisioning. In Proceedings of the 2nd international conference on internet multimedia services architecture and applications (IMSAA), Bangalore, India. doi:10.1109/IMSAA.2008.4753926.

  21. Faigl, Z., Pellikka, J., Bokor, L., & Gurtov, A. (2014). Performance evaluation of current and emerging authentication schemes for future 3GPP network architectures. Computer Networks, 60, 60–74.

    Article  Google Scholar 

  22. Kivinen, T., & Kojo, M. (2003). More modular exponential (MODP) Diffie–Hellman groups for internet key exchange (IKE). IETF RFC 3526.

  23. Rivest, R., Shamir, A., & Adleman, L. (1978). A Method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.

    Article  MATH  MathSciNet  Google Scholar 

  24. Heer, T., & Varjonen, S. (2011). Host identity protocol certificates. IETF RFC 6253.

  25. Laganier, J., Koponen, T., & Eggert, L. (2008). Host identity protocol (HIP) registration extension. IETF RFC 5203.

  26. Nikander, P., Henderson, T., Vogt, C., & Arkko, J. (2008). End-host mobility and multihoming with the host identity protocol. IETF RFC 5206.

  27. Kulkarni, V. G. (1995). Modeling and analysis of stochastic systems. London: Chapman & Hall Ltd.

    MATH  Google Scholar 

  28. Nir, Y. (2006). Repeated authentication in internet key exchange (IKEv2) protocol. IETF RFC 4478.

Download references

Acknowledgments

This work has been carried out in the framework of CELTIC-Plus Project CP2012/2-5 SIGMONA and supported by the “Virtualization-based Mobile Network Optimization” Project of the Hungarian National Development Agency (EUREKA HU 12-1-2012-0054). The author would like to acknowledge the contributions of his colleagues, although the views expressed are those of the author and do not necessarily represent the project. This information reflects the consortium’s view, but the consortium is not liable for any use that may be made of any of the information contained therein.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zoltán Faigl.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Faigl, Z. Performance analysis of signalling overhead in Host Identity Protocol-based secure mobile networks: Ultra Flat Architecture or end-to-end signalling?. Wireless Netw 21, 531–555 (2015). https://doi.org/10.1007/s11276-014-0797-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-014-0797-8

Keywords

Navigation