Skip to main content
Log in

HIMALIS-VI: Fast and Secure Mobility Management Scheme Based on HIMALIS for V2I Services in Future Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

To overcome the inherent limitations of the current Internet architecture, such as lack of mobility support and security mechanism, research has begun on future Internet based on ID/locator split architecture. For the realization of future networks, it is necessary to consider the characteristics of their services and applications, as well as research on their basic architectures. The representative services include Cooperative Intelligent Transportation System (C-ITS) applications based on vehicle-to-vehicle/vehicle-to-infrastructure (V2V/V2I) communication which can prevent vehicular accidents, increase the efficiency of transportation systems, and reduce environmental pollution, all while improving passenger convenience. Since C-ITS services using V2I communication are tightly connected to both passenger and pedestrian safety, they require not only continuous network access but also secure communication regardless of the vehicle mobility. To provide continuous network access and secure communication to moving vehicles in future networks based on an ID/locator split approach, authentication and location updates of moving vehicles should be frequently performed, which results in significant signaling overhead. Therefore, to integrate V2I communication with an ID/locator split approach based on the (R1) HIMALIS architecture, in this paper we propose a novel mobility management scheme, called HIMALIS-VI, which can contribute to a delay reduction for the authentication and mitigating handover procedures at both the mobile hosts and network entities in an edge network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Kafle, V. P., & Inoue, M. (2012). Introducing multi-ID and multi-locator into network architecture. IEEE Communications Magazine, 50(3), 104–110.

    Article  Google Scholar 

  2. Future Internet Research & Experimentation (FIRE) project. http://www.ict-fire.eu/home.html.

  3. Future Internet Architecture (FIA) project. http://www.nets-fia.net/.

  4. Future Internet Design (FIND) project. http://www.nets-find.net/.

  5. AKARI project. http://akari-project.nict.go.jp/eng/index2.htm.

  6. Future Internet Forum (FIF). http://fif.kr/home.php.

  7. Kafle, V. P., Li, R., Inoue, D., & Harai, H. (2013). Design and implementation of security for HIMALIS architecture of future networks. IEICE Transactions on Information and Systems, 96(2), 226–237.

    Article  Google Scholar 

  8. ETSI, TR 102 638 (V1.1.1). (2009). European Telecommunications Standards Institute (ETSI); Intelligent Transport System (ITS); Vehicular Communications; Basic Set of Applications; Definition.

  9. Uzcategui, R. A., & Acosta-Marum, G. (2009). WAVE: A tutorial. IEEE Communications Magazine, 47(5), 126–133.

  10. EU-US ITS Task Force Standards Harmonization Working Group Harmonization Task Group 1, FHWA-JPO-13-077. (2012). EU-US Standards Harmonization Task Group Report: Status of ITS Communication Standards.

  11. Raya, M., Papadimitratos, P., & Hubaux, J.-P. (2006). Securing vehicular communications. IEEE Wireless Communications Magazine, 13(5), 8–15.

    Article  Google Scholar 

  12. Clancy, T. C. (2008). Secure handover in enterprise WLANs: CAPWAP, HOKEY, and IEEE802.11r. IEEE Wireless Communication, 15(5), 80–85.

    Article  Google Scholar 

  13. IETF, RFC 5169, Internet Engineering Task Force (IETF). Clancy, T., Nakhjiri, M., Narayanan, V. & Dondeti, L. (2008). Handover key management and re-authentication problem statement.

  14. IEEE, IEEE Std 802.11r-2008, Institute of Electrical and Electronics Engineers (IEEE). (2008). Wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment: Fast basic service set (BSS) transition.

  15. Karagiannis, G., Altintas, O., Ekici, E., Heijenk, G., Jarupan, B., Lin, K. & Weil, T. (2011). Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, 13(4), 584–616.

  16. IEEE, IEEE Std 802.11i-2004, Institute of Electrical and Electronics Engineers (IEEE) (2004). Wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment: Medium access control (MAC) security enhancements.

  17. IETF, RFC 4862, Internet Engineering Task Force (IETF). Thomson, S., Narten, T. & Jinmei, T. (2007). IPv6 stateless address autoconfiguration.

  18. Jiang, D. & Delgrossi, L. (2008). IEEE 802.11p: Towards an International standard for wireless access in vehicular environments. In Proceedings of the IEEE VTC Spring 2008.

  19. Wang, Z. & Hassan, M. (2009). The throughput-reliability tradeoff in 802.11-based vehicular safety communications. In Proceedings of IEEE CCNC 2009.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongkyun Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jeong, HJ., Kafle, V.P., Yoo, H. et al. HIMALIS-VI: Fast and Secure Mobility Management Scheme Based on HIMALIS for V2I Services in Future Networks. Wireless Pers Commun 78, 2009–2023 (2014). https://doi.org/10.1007/s11277-014-2059-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-2059-6

Keywords

Navigation