Skip to main content
Log in

Secure and efficient binding updates in host-based distributed mobility management

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Rapid evolution in mobile communication is geared toward reliable and responsive network connectivity, thereby necessitating a network protocol operated in a distributed fashion. Distributed mobility management (DMM) achieves low latency and high reliability by shifting the main signaling functions from the core center to the edge of the network. However, there is still room for improvement, especially in the delay response of security operations. This paper proposes the design of an efficient security protocol for binding updates in a DMM environment. The proposed security protocol is designed especially for host-based DMM in which a mobile node plays an active role in mobility and authentication signaling instead of delegating it to the network. The security and performance of the new design are evaluated via theoretical analysis and empirical evaluation in both a laboratory and a live network setting. Based on these evaluations, we contend that in terms of security and performance the proposed security protocol is practical for host-based DMM.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Simsek, M., et al. (2016). 5G-enabled Tactile Internet. IEEE Journal of Selected Areas in Communications, 34(3), 460–473.

    Article  Google Scholar 

  2. Maier, M., et al. (2016). The Tactile Internet: vision, recent progress, and open challenges. IEEE Communications Magazine, 54(5), 138–145.

    Article  Google Scholar 

  3. Perkins, C., Johnson, D., & Arkko, J. (2011). Mobility support in IPv6. IETF RFC 6275.

  4. Gundavelli, S., et al. (2008). Proxy mobile IPv6. IETF RFC 5213.

  5. Soliman, H. (2009). Mobile IPv6 support for dual stack hosts and routers. IETF RFC 5555.

  6. Lee, J., et al. (2014). Mobile data offloading: A host-based distributed mobility management approach. IEEE Internet Computing, 18(01), 20–29.

    Article  Google Scholar 

  7. Liu, D., et al. (2015). Distributed mobility management: Current practices and gap analysis. IETF RFC 7429.

  8. Lee, J., et al. (2013). Distributed IP mobility management from the perspective of the IETF: Motivations, requirements, approaches, comparison, and challenges. IEEE Wireless Communications, 20(5), 159–168.

    Article  Google Scholar 

  9. Dummit, D., Dummit, E., & Kisilevsky, H. (2016). Characterizations of quadratic, cubic, and quartic residue matrices. Journal of Number Theory, 168, 167–179.

    Article  MathSciNet  MATH  Google Scholar 

  10. Elia, M., Piva, M., & Schipani, D. (2015). The Rabin cryptosystem revisited. Applicable Algebra in Engineering, Communication and Computing, 26(3), 251–275.

    Article  MathSciNet  MATH  Google Scholar 

  11. Crypto ++ Libtsty 5.6.3. http://www.cryptopp.com/.

  12. Chuang, M., Lee, J., & Chen, M. (2013). SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks. IEEE Systems Journal, 7(1), 102–113.

    Article  Google Scholar 

  13. Lee, J. (2016). Secure authentication with dynamic tunneling in distributed IP mobility management. IEEE Wireless Communications, 23(5), 38–43.

    Article  Google Scholar 

  14. Rossi, A., Pierre, S., & Krishnan, S. (2013). Secure route optimization for MIPv6 using enhanced CGA and DNSSEC. IEEE Systems Journal, 7(3), 351–362.

    Article  Google Scholar 

  15. Snoeren, A., & Balakrishnan, H. (2000). An end-to-end approach to host mobility. In Proceedings of ACM/IEEE international conference on mobile computing and networking (MobiCom).

  16. Aura, T., et al. (2004). Effects of mobility and multihoming on transport-protocol security. In Proceedings of IEEE symposium security and privacy.

  17. Seggelmann, R., et al. (2012). DTLS mobility. In Proceedings of international conference of distributed computing and networking (ICDCN), pp. 443–457, Hong Kong, China.

  18. Moskowitz, R., et al. (2008). Host identity protocol. IETF RFC 5201.

  19. Raiciu, C., et al. (2011). Opportunistic mobility with multipath TCP. In Proceedings of the sixth international workshop on MobiArch, pp. 7–12, Bethesda, USA.

  20. Jadin, M., et al. (2017). Securing multipath TCP: Design and implementation. In Proceedings of IEEE international conference on computer communications (INFOCOM), Atlanta, USA.

  21. Cui, Y., et al. (2017). Innovating transport with QUIC: Design approaches and research challenges. IEEE Internet Computing, 21(2), 72–76.

    Article  Google Scholar 

  22. Eronen, P., et al. (2006). IKEv2 mobility and multihoming (MOBIKE) protocol. IETF RFC 4621.

  23. Korhonen, J., et al. (2012). Mobile IPv6 security framework using transport layer security for communication between the mobile node and home agent. IETF RFC 6618.

  24. Forsberg, D., et al. (2008). Protocol for carrying authentication for network access (PANA). IETF RFC 5191.

  25. Zorn, G., et al. (2012). Handover Keying (HOKEY) architecture design. IETF RFC 6697.

Download references

Acknowledgements

This work was supported by Institute for Information and communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2017-0-01861, Research on the security of operating system).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyoung-Kee Choi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, S., Choi, HK., Kim, E. et al. Secure and efficient binding updates in host-based distributed mobility management. Wireless Netw 25, 1443–1459 (2019). https://doi.org/10.1007/s11276-017-1603-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-017-1603-1

Keywords

Navigation