Skip to main content
Log in

SEIP: Secure and seamless IP communications for group-oriented machine to machine communications

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The main requirements of machine to machine (M2M) communication in 5G include support of a massive number of low-data-rate devices and very-low-latency data transfer. Addressing these requirements in 5G requires new methods and in this paper we focus on one of the paramount issues, i.e., secure and seamless IP communications for group-oriented M2M communications. We consider a heterogeneous network architecture based on 3GPP standard, in which the handover occurs between E-UTRAN and Non-3GPP access network. We first propose an improved Proxy Mobile IPv6 (PMIPv6) protocol, and further implement the improved PMIPv6 associated with the group-based lightweight authentication scheme to achieve secure and seamless IP communications, named SEIP, which improves handover latency, packet loss, and signaling overhead. Particularly, SEIP performs access authentication process before IP layer (L3) and link layer (L2) handover to reduce handover delay. In addition, it uses packet buffering and forwarding mechanisms to reduce packet loss during the handover period. SEIP can not only fulfill security requirements in previous protocols, but also can successfully resist some sophisticated attacks, such as redirection, DoS attacks, etc. The results of performance analysis illustrate that SEIP achieves better performance in terms of signaling cost on wireless link, handover latency and packet loss compared to several other schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. M2M D l e a d e r can be selected based on the communication capability, storage status and battery status of each M2MD or can be assigned in advance according to the requirement of applications.

References

  1. Lu R, Li X, Liang X, Shen X, Lin X (2011) Grs: The green, reliability, and security of emerging machine to machine communications. IEEE Commun Mag 49(4):28–35

    Article  Google Scholar 

  2. Li X, Rao J, Zhang H (2016) Engineering machine-to-machine traffic in 5G. IEEE Int Things J 3 (4):609–618

    Article  Google Scholar 

  3. Gazis VA survey of standards for machine to machine (M2M) and the internet of things (IoT). IEEE Commun Surv Tutor, to appear

  4. 3GPP TR 23.888 V1.4.0, System Improvements for Machine-Type Communications, August 2011

  5. Kushalnagar N, Montenegro G, Schumacher C (2007) IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. Heise Zeitschriften Verlag

  6. Floroiu JW, Ruppelt R, Sisalem D, Voglimacci J (2003) Seamless handover in terrestrial radio access networks: A case study. IEEE Commun Mag 41(11):110–116

    Article  Google Scholar 

  7. Perkins C (1996) Ip mobility support. Int J Comput Trends Technol 9:7

    Google Scholar 

  8. Deering S (1998) Rfc 2460: Internet protocol, version 6 (ipv6) specification. In: RTP, UDP, ESP, and uncompressed, pp 1860–1864

  9. Perkins CE, Johnson DB (2001) Mobility support in IPv6. RFC 3775

  10. Koodli R (2005) Fast handovers for mobile IPv6. RFC 4068

  11. Soliman H, Castelluccia C, El-Malki K, Bellier L, Soliman H, Castelluccia C, El-Malki K, Bellier L (2008) Hierarchical mobile IPv6 (HMIPv6) mobility management. RFC 4140

  12. Lee K, Mun Y (2009) Fast macro mobility handovers in HMIPv6 draft-mun-mipshop-fhmacro-04

  13. Gundavelli ES, Leung K, Devarapalli V, Chowdhury K, Patil B (2008) Proxy mobile IPv6. RFC 5213

  14. Ryu S, Kim GY, Kim B, Mun Y (2008) A scheme to reduce packet loss during PMIPv6 handover considering authentication. In: International conference on computational sciences and its applications, pp 47–51

  15. Ryu S, Kim M, Mun Y (2009) Enhanced fast handovers for proxy mobile IPv6. In: International conference on computational science and its applications, pp 39–43

  16. Lee S, Latchman HA, Park B (2010) Efficient handover scheme of proxy mobile IPv6 in wireless local area networks. Int J Multimed Ubiquit Eng 5

  17. Ali-Ahmad H, Ouzzif M, Bertin P, Lagrange X (2012) Comparative performance analysis on dynamic mobility anchoring and proxy mobile IPv6. In: International conference on information, networking and automation (ICINA), pp 653–657

  18. Tsao SL, Lin CC (2002) Design and evaluation of UMTS-WLAN interworking strategies. IEEE VTC 2002 Fall 2:777–781

    Google Scholar 

  19. Chen J-C, Chen W-M, Lin H-W (2005) Design and analysis of GPRS-WLAN mobility gateway (GWMG). IEEE Int Conf Commun 2:918–923

    Google Scholar 

  20. Phiri FA, Murthy M (2007) WLAN-GPRS tight coupling based interworking architecture with vertical handoff support. Wirel Pers Commun 40(2):137–144

    Article  Google Scholar 

  21. Lu R, Lin X, Zhu H, Ho P-H, Shen X (2009) A novel anonymous mutual authentication protocol with provable link-layer location privacy. IEEE Trans Veh Technol 58(3):1454–1466

    Article  Google Scholar 

  22. Zhu H, Lin X, Lu R, Ho P-h, et al (2008) Slab: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans Wirel Commun 7(10):3858–3868

    Article  Google Scholar 

  23. Wu IW, Chen WS, Liao HE, Young FF (2002) A seamless handoff approach of mobile ip protocol for mobile wireless data networks. IEEE Trans Consum Electron 48(2):335–344

    Article  Google Scholar 

  24. Badache N, Tandjaoui D (2002) A seamless handoff protocol for hierarchical mobile ipv4. In: International workshop on mobile and wireless communications network, pp 651–655

  25. Lai C, Lu R, Zheng D, Li H, Shen X (2016) GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Comput Netw 99:66– 81

    Article  Google Scholar 

  26. Lai C, Li H, Li X, Cao J (2013) A novel group access authentication and key agreement protocol for machine-type communication. Trans Emerg Telecommun Technol 26(3):414–431

    Article  Google Scholar 

  27. Piscataway N (1996) Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE D3:C1–1184

    Google Scholar 

  28. Katz J, Lindell A (2008) Aggregate message authentication codes. In: Topics in cryptology–CT-RSA 2008. Springer, pp 155–169

  29. Huang J-L, Yeh L-Y, Chien H-Y (2011) ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans Veh Technol 60(1):248–262

    Article  Google Scholar 

  30. Lo SC, Lee G, Chen WT, Liu JC (2004) Architecture for mobility and QoS support in all-IP wireless networks. IEEE J Select Areas Commun 22(4):691–705

    Article  Google Scholar 

  31. Kong KS, Lee W, Han YH, Shin MK (2008) Mobility management for all-IP mobile networks: Mobile IPv6 vs. proxy mobile IPv6. IEEE Wirel Commun 15(2):36–45

    Article  Google Scholar 

  32. Stephane A, Aghvami A H (2001) Fast handover schemes for future wireless ip networks: A proposal and analysis. In: Vehicular technology conference, 1988, IEEE 38th, vol 3, pp 2046–2050

  33. Han YH, Choi JH, Hwang SH (2006) Reactive handover optimization in IPv6-based mobile networks. IEEE J Selected Areas Commun 24(9):1758–1772

    Article  Google Scholar 

  34. Seite P (2010) Ipv6 stateless address autoconfiguration

  35. Fathi H, Prasad R, Chakraborty S (2005) Mobility management for VoIP in 3G systems: Evaluation of low-latency handoff schemes. IEEE Wirel Commun 12(2):96–104

    Article  Google Scholar 

  36. Narten BT, Nordmark E, Simpson W, Soliman H (2010) Neighbor discovery for ip version. Internet Eng Task Force

Download references

Acknowledgment

This work is supported by the National Natural Science Foundation of China Research Grant (61502386, 61472472, 61402354, 61402354), the International Science and Technology Cooperation and Exchange Plan in Shaanxi Province of China (2015KW-010).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chengzhe Lai.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lai, C., Guo, W., Li, Y. et al. SEIP: Secure and seamless IP communications for group-oriented machine to machine communications. Peer-to-Peer Netw. Appl. 11, 821–836 (2018). https://doi.org/10.1007/s12083-017-0568-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-017-0568-2

Keywords

Navigation