Performance analysis of signalling overhead in Host Identity Protocol-based secure mobile networks: Ultra Flat Architecture or end-to-end signalling?

被引:0
|
作者
Zoltán Faigl
机构
[1] Mobile Innovation Centre,
来源
Wireless Networks | 2015年 / 21卷
关键词
Performance analysis; Delegation of signalling rights ; Ultra Flat Architecture; Host Identity Protocol; Secure mobile network;
D O I
暂无
中图分类号
学科分类号
摘要
This paper evaluates the performance overheads of two Host Identity Protocol-based signalling schemes controlling internet protocol connectivity establishment and handover procedures in distributed mobile networks. The paper proves using an analytical model that the Ultra Flat Architecture has significant performance gains on user side, in the access networks and at the rendezvous service over the terminal-based architecture due to the application of delegation of signalling rights. On the other hand, the former architecture results in greater overhead in the transport network connecting the gateways and at the gateways. The results also provide guidance on the optimal setting of protocol lifetime parameters, maximum delegation authorization certificate chain length and distribution level of gateways in both schemes.
引用
收藏
页码:531 / 555
页数:24
相关论文
共 11 条
  • [1] Performance analysis of signalling overhead in Host Identity Protocol-based secure mobile networks: Ultra Flat Architecture or end-to-end signalling?
    Faigl, Zoltan
    WIRELESS NETWORKS, 2015, 21 (02) : 531 - 555
  • [2] MODELING THE SIGNALING OVERHEAD IN HOST IDENTITY PROTOCOL-BASED SECURE MOBILE ARCHITECTURES
    Faigl, Zoltan
    Telek, Miklos
    JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2015, 11 (03) : 887 - 920
  • [3] A secure end-to-end SMS-based mobile banking protocol
    Bojjagani, Sriramulu
    Sastry, V. N.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (15)
  • [4] A secure end-to-end proximity NFC-based mobile payment protocol
    Bojjagani, Sriramulu
    Sastry, V. N.
    COMPUTER STANDARDS & INTERFACES, 2019, 66
  • [5] SINGLETON: A lightweight and secure end-to-end encryption protocol for the sensor networks in the Internet of Things based on cryptographic ratchets
    Amir Hassani Karbasi
    Siyamak Shahpasand
    The Journal of Supercomputing, 2021, 77 : 3516 - 3554
  • [6] SINGLETON: A lightweight and secure end-to-end encryption protocol for the sensor networks in the Internet of Things based on cryptographic ratchets
    Karbasi, Amir Hassani
    Shahpasand, Siyamak
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (04): : 3516 - 3554
  • [7] A Beaconless minimum Interference Based Routing Protocol to minimize End-to-End Delay per Packet for mobile Ad Hoc Networks
    Meghanathan, Natarajan
    Sugumar, Meena
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2010, 2 (01) : 12 - 26
  • [8] Challenges in Implementing an End-to-End Secure Protocol for Java']Java ME-Based Mobile Data Collection in Low-Budget Settings
    Gejibo, Samson
    Mancini, Federico
    Mughal, Khalid A.
    Valvik, Remi
    Klungsoyr, Jorn
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 38 - +
  • [9] Data-flow in mobile edge computing networks: end-to-end performance analysis using stochastic network calculus
    Zhu Xiaorong
    Jing Chuanfang
    Shi Jindou
    Wang Yong
    Ho Chifong
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2022, 29 (01) : 81 - 92
  • [10] Data-flow in mobile edge computing networks: end-to-end performance analysis using stochastic network calculus
    Xiaorong Z.
    Chuanfang J.
    Jindou S.
    Yong W.
    Chifong H.
    Journal of China Universities of Posts and Telecommunications, 2022, 29 (01): : 81 - 92