DMAM: distributed mobility and authentication mechanism in next generation networks

被引:4
|
作者
Zubair, Muhammad [1 ]
Kong, Xiangwei [1 ]
Mahfooz, Saeed [2 ]
机构
[1] Dalian Univ Technol, Sch Informat & Commun Engn, Dalian, Peoples R China
[2] Univ Peshawar, Dept Comp Sci, Peshawar, Pakistan
关键词
next generation networks; mobility management; distributed mobility; handover; authentication; MANAGEMENT; SUPPORT;
D O I
10.1002/sec.1041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional centralized approaches toward mobility management such as MIPv6 and its variants suffer because of the performance issues like single-point failure, non-optimal routing, low scalability, authentication latency, and signaling messages overhead of the mobility protocols. In this paper, we propose a novel network-based Distributed Mobility and Authentication Mechanism (DMAM) to focus on these issues. DMAM decomposes centralized mobility functions into Home Address Allocation, mobility routing (MR), and location management (LM). A new entity is introduced in DMAM, called Location and Mobility Manager that distributes MR and LM among multiple routers to which mobile node can be attached. Furthermore, DMAM offers strong authentication mechanism based on symmetric cryptographic and collision-free one-way hash function. The performance of proposed scheme is analyzed and compared with existing approaches in terms of handover latency, handover blocking probability, packet loss, communication overhead, and computational cost. The conducted numerical results demonstrate that DMAM outperforms the existing approaches. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:845 / 863
页数:19
相关论文
共 50 条
  • [31] A dynamic hierarchical mobility management protocol for next generation wireless metropolitan area networks
    Zhou, Hairong
    Yeh, Chihsiang
    Mouftah, Hussein T.
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 390 - +
  • [32] An Authentication Protocol for Next Generation of Constrained IoT Systems
    Rostampour, Samad
    Bagheri, Nasour
    Bendavid, Ygal
    Safkhani, Masoumeh
    Kumari, Saru
    Rodrigues, Joel J. P. C.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (21) : 21493 - 21504
  • [33] Distributed Node Authentication in Wireless Sensor Networks
    Zhang, Qiyuan
    Zhou, Xuehai
    Yang, Feng
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3361 - 3364
  • [34] QoS in next generation networks
    Lorenz, P
    ITI 2004: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2004, : 13 - 18
  • [35] A Survey on Next Generation Networks
    Vaishnavi, Veeragandham Sree
    Roopa, Y. Mohana
    Murthy, P. L. Srinivasa
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 162 - 171
  • [36] A lightweight authentication mechanism in MIP networks
    Kim, Green
    Kim, Youngse
    Heo, Ung
    Kim, Keecheon
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4272 - 4284
  • [37] An architecture for seamless mobility support in IP-based next-generation wireless networks
    Makaya, Christian
    Pierre, Samuel
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008, 57 (02) : 1209 - 1225
  • [38] Mobility management for IP-based next generation mobile networks: Review, challenge and perspective
    Al-Surmi, Ibrahim
    Othman, Mohamed
    Ali, Borhanuddin Mohd
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) : 295 - 315
  • [39] The Pervasive Trust Foundation for Security in Next Generation Networks
    Lilien, Leszek
    Al-Alawneh, Adawia
    Ben Othmane, Lotfi
    NEW SECURITY PARADIGMS WORKSHOP 2010, 2010, : 129 - 141
  • [40] SDN Based Control Plane Extensions for Mobility Management Improvement in Next Generation ETArch Networks
    Dantas Silva, Felipe S.
    Neto, Augusto J. V.
    Maciel, Douglas Braz
    Castillo-Lema, Jose
    Silva, Flavio de Oliveira
    Rosa, Pedro Frosi
    MSWIM'15: PROCEEDINGS OF THE 18TH ACM INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2015, : 189 - 193