Abstract
Mobility protocols allow hosts to change their location or network interface while maintaining ongoing sessions. While such protocols can facilitate vertical mobility in a cost-efficient and access agnostic manner, they are not sufficient to address all security issues when used in scenarios requiring local mobility management. In this paper, we propose a new scheme that makes Host Identity Protocol (HIP) able to serve as an efficient and secure mobility protocol for wireless heterogeneous networks while preserving all the advantages of the base HIP functions as well. Our proposal, called Heterogeneous Mobility HIP (HMHIP), is based on hierarchical topology of rendezvous Servers (RVSs), signaling delegation, and inter-RVS communication to enable secure and efficient network mobility support in the HIP layer. Formal security analysis using the AVISPA tool and performance evaluation of this method are provided; they confirm the safety and efficiency of the proposed solution. HMHIP reduces handover latency and packet overhead during handovers by achieving registration locally.
Similar content being viewed by others
References
Gundavelli S, Leung K, Devarapalli V, Chowdhury K, Patil B (2008) Proxy mobile IPv6. IETF, RFC 5213
Moskowitz R, Nikander P (2006) Host Identity Protocol (HIP) architecture. RFC 4423, IETF
Stewart R, Xie Q, Morneault K, Sharp C, Schwarzbauer H, Taylor T, Rytina I, Kalla M, Xhang L, Paxson V (2000) Stream control transmission protocol. RFC 2960, IETF
Nordmark E, Bagnulo M (2009) Shim6: level 3 multihoming shim protocol for IPv6. RFC 5533, IETF
Aura T, Nagarajan A, Gurtov A (2005) Analysis of the HIP base exchange protocol. 10th Australasian conference on information security and privacy (ACISP 2005), 481–493. Brisbane, Australia
Tritilanunt S, Boyd C, Foo E, González Nieto JM (2007) Cost-based and time-based analysis of DoS-resistance in HIP. Thirtieth Australasian conference on computer science (ACSC ’07), 191–200. Darlinghurst, Australia, January 30–February 2
Juha S, Mikko S (2010) Risk analysis of host identity protocol: using risk Identification method based on value chain dynamics toolkit. Fourth European conference on software architecture (ECSA), 213–220. Copenhagen, Denmark
3GPP. 3rd Generation Partnerhandover Project; Technical Specification Group Radio Access Network; Evolved Universal terrestrial radio access (E-UTRA); Physical layer procedures (Release8) GPP TS 36.213 V8.8.0 (2009–09)
Nikander P, Gurtov A, Henderson TR (2010) Host Identity Protocol (HIP): connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks. IEEE Commun Surveys Tutorials 12(2):186–204
Aura T (2005) Cryptographically generated addresses (CGA). RFC 3972, IETF
Bagnulo M (2009) Hash-based addresses (HBA). RFC 5535, IETF
Crocker D (2003) Multiple address service for transport (MAST): an extended proposal. Draft-crocker-mastproposal-01, IETF
Vogt C (2005) Credit-based authorization for HIP mobility with concurrent. Draft-vogt-hip-credit-based-authorization-00, IETF
Heer T (2007) LHIP lightweight authentication extension for HIP. Draft-heer-hip-lhip-00, IETF
Hampel G, Kolesnikov V (2010) Lightweight security solution for host-based mobility and multi-homing protocols. IEEE globecom workshop on seamless wireless mobility
Nikander P, Arkko J, Aura T, Montenegro G, Nordmark E (2005) Mobile IP version 6 route optimization security design background. RFC 4225, IETF
Laganier J, Eggert L (2008) Host Identity Protocol (HIP) Ren-dezvous extension. Draft-ietf-hip-rvs-04
Jokela P, Melen J, Ylitalo J (2006) HIP service discovery. IETF Internet Draft (draft-jokela-hip-service-discovery-00)
Laganier J, Koponen T, Eggert L (2006) Host Identity Protocol (HIP) registration extension. IETF Internet Draft (draft-ietf-hip-registration-02)
Daly I, Zarai F, Kamoun L (2012) Design and implementation of a simulation environment for the evaluation of authentication protocols in IEEE 802.11s networks. 3rd International ICST conference on mobile lightweight wireless systems, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol 81, Part 4, 206–218
The avispa project. Available http://www.avispa-project.org/
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
El Bouabidi, I., Zarai, F., Obaidat, M.S. et al. Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks. J Supercomput 70, 1036–1050 (2014). https://doi.org/10.1007/s11227-013-1080-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-013-1080-y