Secure and efficient binding updates in host-based distributed mobility management

Rapid evolution in mobile communication is geared toward reliable and responsive network connectivity, thereby necessitating a network protocol operated in a distributed fashion. Distributed mobility management (DMM) achieves low latency and high reliability by shifting the main signaling functions from the core center to the edge of the network. However, there is still room for improvement, especially in the delay response of security operations. This paper proposes the design of an efficient security protocol for binding updates in a DMM environment. The proposed security protocol is designed especially for host-based DMM in which a mobile node plays an active role in mobility and authentication signaling instead of delegating it to the network. The security and performance of the new design are evaluated via theoretical analysis and empirical evaluation in both a laboratory and a live network setting. Based on these evaluations, we contend that in terms of security and performance the proposed security protocol is practical for host-based DMM.

[1]  Hershy Kisilevsky,et al.  Characterizations of quadratic, cubic, and quartic residue matrices , 2015 .

[2]  Marcelo Bagnulo,et al.  Opportunistic mobility with multipath TCP , 2011, MobiArch '11.

[3]  H. Anthony Chan,et al.  Distributed Mobility Management: Current Practices and Gap Analysis , 2015, RFC.

[4]  Glen Zorn,et al.  Handover Keying (HOKEY) Architecture Design , 2012, RFC.

[5]  Samuel Pierre,et al.  Secure Route Optimization for MIPv6 Using Enhanced CGA and DNSSEC , 2013, IEEE Systems Journal.

[6]  Jean-Marie Bonnin,et al.  Distributed IP mobility management from the perspective of the IETF: motivations, requirements, approaches, comparison, and challenges , 2013, IEEE Wireless Communications.

[7]  Jong-Hyouk Lee Secure authentication with dynamic tunneling in distributed IP mobility management , 2016, IEEE Wireless Communications.

[8]  Pekka Nikander,et al.  Host Identity Protocol , 2005 .

[9]  Jean-Marie Bonnin,et al.  Mobile Data Offloading: A Host-Based Distributed Mobility Management Approach , 2014, IEEE Internet Computing.

[10]  Dan Forsberg,et al.  Protocol for Carrying Authentication for Network Access (PANA) , 2008, RFC.

[11]  Basavaraj Patil,et al.  Mobile IPv6 Security Framework Using Transport Layer , 2012 .

[12]  Davide Schipani,et al.  The Rabin cryptosystem revisited , 2011, Applicable Algebra in Engineering, Communication and Computing.

[13]  Olivier Bonaventure,et al.  Securing multipath TCP: Design & implementation , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[14]  Hesham Soliman,et al.  Status of this Memo , 1985 .

[15]  Gerhard Fettweis,et al.  5G-Enabled Tactile Internet , 2016, IEEE Journal on Selected Areas in Communications.

[16]  Hari Balakrishnan,et al.  An end-to-end approach to host mobility , 2000, MobiCom '00.

[17]  Pekka Nikander,et al.  Effects of mobility and multihoming on transport-protocol security , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[18]  Basavaraj Patil,et al.  Proxy Mobile IPv6 , 2008, RFC.

[19]  Erwin P. Rathgeb,et al.  DTLS Mobility , 2012, ICDCN.

[20]  Cong Liu,et al.  Innovating Transport with QUIC: Design Approaches and Research Challenges , 2017, IEEE Internet Computing.

[21]  Pasi Eronen,et al.  IKEv2 Mobility and Multihoming Protocol (MOBIKE) , 2006, RFC.

[22]  Meng Chang Chen,et al.  SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks , 2013, IEEE Systems Journal.

[23]  Martin Maier,et al.  The tactile internet: vision, recent progress, and open challenges , 2016, IEEE Communications Magazine.