DMAM: distributed mobility and authentication mechanism in next generation networks

被引:4
|
作者
Zubair, Muhammad [1 ]
Kong, Xiangwei [1 ]
Mahfooz, Saeed [2 ]
机构
[1] Dalian Univ Technol, Sch Informat & Commun Engn, Dalian, Peoples R China
[2] Univ Peshawar, Dept Comp Sci, Peshawar, Pakistan
关键词
next generation networks; mobility management; distributed mobility; handover; authentication; MANAGEMENT; SUPPORT;
D O I
10.1002/sec.1041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional centralized approaches toward mobility management such as MIPv6 and its variants suffer because of the performance issues like single-point failure, non-optimal routing, low scalability, authentication latency, and signaling messages overhead of the mobility protocols. In this paper, we propose a novel network-based Distributed Mobility and Authentication Mechanism (DMAM) to focus on these issues. DMAM decomposes centralized mobility functions into Home Address Allocation, mobility routing (MR), and location management (LM). A new entity is introduced in DMAM, called Location and Mobility Manager that distributes MR and LM among multiple routers to which mobile node can be attached. Furthermore, DMAM offers strong authentication mechanism based on symmetric cryptographic and collision-free one-way hash function. The performance of proposed scheme is analyzed and compared with existing approaches in terms of handover latency, handover blocking probability, packet loss, communication overhead, and computational cost. The conducted numerical results demonstrate that DMAM outperforms the existing approaches. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:845 / 863
页数:19
相关论文
共 50 条
  • [41] Robust and Lightweight Remote User Authentication Mechanism for Next-Generation IoT-Based Smart Home
    Ashraf, Zeeshan
    Sohail, Adnan
    Hameed, Abdul
    Farhan, Muhammad
    Alotaibi, Faiz Abdullah
    Alnfiai, Mrim M.
    IEEE ACCESS, 2023, 11 : 137899 - 137910
  • [42] Distributed location management strategy for next-generation IP-based wireless networks
    Song, Mei
    Feng, Rui-Jun
    Huang, Jian-Wen
    Song, Jun-De
    Journal of China Universities of Posts and Telecommunications, 2006, 13 (03): : 38 - 42
  • [43] Design and Robust Evaluation of Next Generation Node Authentication Approach
    Nguyen, Dinh Duc Nha
    Sood, Keshav
    Xiang, Yong
    Gao, Longxiang
    Chi, Lianhua
    Singh, Gurpreet
    Yu, Shui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5311 - 5323
  • [44] A secure and lightweight authentication scheme for next generation IoT infrastructure
    Rana, Minahil
    Shafiq, Akasha
    Altaf, Izwa
    Alazab, Mamoun
    Mahmood, Khalid
    Chaudhry, Shehzad Ashraf
    Bin Zikria, Yousaf
    COMPUTER COMMUNICATIONS, 2021, 165 : 85 - 96
  • [46] SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks
    Chuang, Ming-Chin
    Lee, Jeng-Farn
    Chen, Meng-Chang
    IEEE SYSTEMS JOURNAL, 2013, 7 (01): : 102 - 113
  • [47] Penetration Tests in Next Generation Networks
    Rezac, Filip
    Voznak, Miroslav
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2012, 2012, 8406
  • [48] A Secure Authentication Mechanism for Wireless Sensor Networks
    Ali, Rifaqat
    Chandrakar, Preeti
    Obaidat, Mohammad S.
    Hsiao, Kuei-Fang
    Pal, Arup Kumar
    Islam, S. K. Hafizul
    PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2020, : 206 - 213
  • [49] Erlang Formulas and Next Generation Networks
    Chromy, Erik
    KNOWLEDGE IN TELECOMMUNICATION TECHNOLOGIES AND OPTICS 2010 (KTTO 2010), 2010, : 17 - 21
  • [50] High Security Authentication Mechanism for Mobile Networks
    Guo, Ming-Huang
    Liaw, Horng-Twu
    Tang, Jui-Kheng
    Yen, Chih-Ta
    SECURITY-ENRICHED URBAN COMPUTING AND SMART GRID, 2011, 223 : 287 - +