Skip to main content
Log in

Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Mobility protocols allow hosts to change their location or network interface while maintaining ongoing sessions. While such protocols can facilitate vertical mobility in a cost-efficient and access agnostic manner, they are not sufficient to address all security issues when used in scenarios requiring local mobility management. In this paper, we propose a new scheme that makes Host Identity Protocol (HIP) able to serve as an efficient and secure mobility protocol for wireless heterogeneous networks while preserving all the advantages of the base HIP functions as well. Our proposal, called Heterogeneous Mobility HIP (HMHIP), is based on hierarchical topology of rendezvous Servers (RVSs), signaling delegation, and inter-RVS communication to enable secure and efficient network mobility support in the HIP layer. Formal security analysis using the AVISPA tool and performance evaluation of this method are provided; they confirm the safety and efficiency of the proposed solution. HMHIP reduces handover latency and packet overhead during handovers by achieving registration locally.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Gundavelli S, Leung K, Devarapalli V, Chowdhury K, Patil B (2008) Proxy mobile IPv6. IETF, RFC 5213

  2. Moskowitz R, Nikander P (2006) Host Identity Protocol (HIP) architecture. RFC 4423, IETF

  3. Stewart R, Xie Q, Morneault K, Sharp C, Schwarzbauer H, Taylor T, Rytina I, Kalla M, Xhang L, Paxson V (2000) Stream control transmission protocol. RFC 2960, IETF

  4. Nordmark E, Bagnulo M (2009) Shim6: level 3 multihoming shim protocol for IPv6. RFC 5533, IETF

  5. Aura T, Nagarajan A, Gurtov A (2005) Analysis of the HIP base exchange protocol. 10th Australasian conference on information security and privacy (ACISP 2005), 481–493. Brisbane, Australia

  6. Tritilanunt S, Boyd C, Foo E, González Nieto JM (2007) Cost-based and time-based analysis of DoS-resistance in HIP. Thirtieth Australasian conference on computer science (ACSC ’07), 191–200. Darlinghurst, Australia, January 30–February 2

  7. Juha S, Mikko S (2010) Risk analysis of host identity protocol: using risk Identification method based on value chain dynamics toolkit. Fourth European conference on software architecture (ECSA), 213–220. Copenhagen, Denmark

  8. 3GPP. 3rd Generation Partnerhandover Project; Technical Specification Group Radio Access Network; Evolved Universal terrestrial radio access (E-UTRA); Physical layer procedures (Release8) GPP TS 36.213 V8.8.0 (2009–09)

  9. Nikander P, Gurtov A, Henderson TR (2010) Host Identity Protocol (HIP): connectivity, mobility, multi-homing, security, and privacy over IPv4 and IPv6 networks. IEEE Commun Surveys Tutorials 12(2):186–204

    Article  Google Scholar 

  10. Aura T (2005) Cryptographically generated addresses (CGA). RFC 3972, IETF

  11. Bagnulo M (2009) Hash-based addresses (HBA). RFC 5535, IETF

  12. Crocker D (2003) Multiple address service for transport (MAST): an extended proposal. Draft-crocker-mastproposal-01, IETF

  13. Vogt C (2005) Credit-based authorization for HIP mobility with concurrent. Draft-vogt-hip-credit-based-authorization-00, IETF

  14. Heer T (2007) LHIP lightweight authentication extension for HIP. Draft-heer-hip-lhip-00, IETF

  15. Hampel G, Kolesnikov V (2010) Lightweight security solution for host-based mobility and multi-homing protocols. IEEE globecom workshop on seamless wireless mobility

  16. Nikander P, Arkko J, Aura T, Montenegro G, Nordmark E (2005) Mobile IP version 6 route optimization security design background. RFC 4225, IETF

  17. Laganier J, Eggert L (2008) Host Identity Protocol (HIP) Ren-dezvous extension. Draft-ietf-hip-rvs-04

  18. Jokela P, Melen J, Ylitalo J (2006) HIP service discovery. IETF Internet Draft (draft-jokela-hip-service-discovery-00)

  19. Laganier J, Koponen T, Eggert L (2006) Host Identity Protocol (HIP) registration extension. IETF Internet Draft (draft-ietf-hip-registration-02)

  20. Daly I, Zarai F, Kamoun L (2012) Design and implementation of a simulation environment for the evaluation of authentication protocols in IEEE 802.11s networks. 3rd International ICST conference on mobile lightweight wireless systems, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol 81, Part 4, 206–218

  21. The avispa project. Available http://www.avispa-project.org/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Faouzi Zarai.

Rights and permissions

Reprints and permissions

About this article

Cite this article

El Bouabidi, I., Zarai, F., Obaidat, M.S. et al. Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks. J Supercomput 70, 1036–1050 (2014). https://doi.org/10.1007/s11227-013-1080-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-013-1080-y

Keywords

Navigation