On predictive routing of security contexts in an all-IP network

被引:1
|
作者
Kim, Hahnsang [1 ]
Shin, Kang G. [1 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Real Time Comp Lab, Ann Arbor, MI 48109 USA
关键词
secure seamless handovers; selective predictive routing; edit distance; chi(2)-distance; MOBILITY MANAGEMENT; HANDOFF;
D O I
10.1002/sec.135
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While mobile nodes (MNs) undergo handovers across inter-wireless access networks, their security contexts must be propagated for secure re-establishment of on-going application sessions, such as those in secure mobile internet protocol (IP), authentication, authorization, and accounting (AAA) services. Routing security contexts via an IP network either on-demand or based on MNs' mobility prediction, imposes new challenging requirements of secure cross-handover services and security context management. In this paper, we present a context router (CXR) that manages security contexts in an all-IP network, providing seamless and secure handover services for the mobile users that carry multimedia-access devices. A CXR is responsible for (1) monitoring of MNs' cross-handover, (2) analysis of MNs' movement patterns, and (3) routing of security contexts ahead of MNs' arrival at relevant access points. The predictive routing reduces the delay in the underlying security association that would otherwise fetch an involved security context from a remote server. The predictive routing of security contexts is performed based on statistical learning of MNs' movement pattern, gauging (dis) similarities between the patterns obtained via distance measurements. The CXR has been evaluated with a prototypical implementation based on an MN mobility model on a grid. Our evaluation results support the predictive routing mechanism's improvement in seamless and secure cross-handover services by a factor of 2.5. Also, the prediction mechanism is shown to outperform the Kalman filter-based method [13] as a Kalman Fiter-based mechanism up to 1.5 and 3.6 times regarding prediction accuracy and computation performance, respectively. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:4 / 15
页数:12
相关论文
共 50 条
  • [1] All-IP Networks: Mobility and Security
    Talukder, Asoke K.
    [J]. CONVERGENCE THROUGH ALL-IP NETWORKS, 2013, : 275 - 306
  • [2] Migration strategies to an all-IP network
    Philpott, M
    [J]. JOURNAL OF THE COMMUNICATIONS NETWORK, 2002, 1 : 47 - 51
  • [3] In search of the All-IP mobile network
    Newman, P
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2004, 42 : S3 - S8
  • [4] IDNet: Beyond All-IP Network
    Jung, Heeyoung
    Lim, Wan-Seon
    Hong, Jungha
    Hur, Cinyoung
    Lee, Joo-Chul
    You, Taewan
    Eun, Jeesook
    Kwak, Byeongok
    Kim, Jeonghwan
    Jeon, Hae Sook
    Kim, Tae Hwan
    Chun, Woojik
    [J]. ETRI JOURNAL, 2015, 37 (05) : 833 - 844
  • [5] A Survey on All-IP Wireless Sensor Network
    Zhou, Quan
    Zhang, Runtong
    [J]. PROCEEDINGS OF 2ND CONFERENCE ON LOGISTICS, INFORMATICS AND SERVICE SCIENCE (LISS 2012), VOLS 1 AND 2, 2013,
  • [6] All-IP network architecture for Mobile WiMAX™
    Iyer, Prakash
    Natarajan, Nat
    Venkatachalam, Muthaiah
    Bedekar, Anand
    Gonen, Eren
    Etemad, Kamran
    Taaghol, Pouya
    [J]. 2007 IEEE MOBILE WIMAX SYMPOSIUM, 2007, : 54 - +
  • [7] Brief Introduction to the Trends towards All-IP Network
    Nie Xiuying
    [J]. CHINA COMMUNICATIONS, 2010, 7 (01) : 120 - 123
  • [8] Constructing a DRL Decision Making Scheme for Multi-Path Routing in All-IP Access Network
    Tang, Jiaqi
    Mihailovic, Andrej
    Aghvami, Hamid
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3623 - 3628
  • [9] Predictive Routing of Contexts in an Overlay Network
    Kim, Hahnsang
    Shin, Kang G.
    [J]. 2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009) VOLS 1 AND 2, 2009, : 57 - 64
  • [10] Serving radio network controller relocation for UMTS All-IP network
    Pang, AC
    Lin, YB
    Hsien-Ming, T
    Agrawal, P
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004, 22 (04) : 617 - 629