A novel architecture for secure, always-best connected ship-shore communications

Together with the IMO's future navigation system implementation strategy, the e-navigation, wireless access technologies are proliferating on the maritime scenario, covering last mile communications. In the near future, we foresee that communication technologies will coexist and will be available in overlapping areas through the maritime last mile. Therefore, in order to enhace ship-shore communications, always-best-connected procedures and an efficient mobility management protocol is required to satisfy maritime context peculiarities such as safety and security. In this article we analyze the most suitable mobility management protocol in terms of security and handover efficiency and propose a novel architecture that integrates the HIP protocol and always-best-connected procedures to best achieve maritime context specifications.

[1]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[2]  Jürgen Quittek,et al.  NAT and Firewall Traversal Issues of Host Identity Protocol (HIP) Communication , 2008, RFC.

[3]  Rajeev Koodli,et al.  Fast Handovers for Mobile IPv6 , 2001, RFC.

[4]  Pekka Nikander,et al.  Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties , 2002, Security Protocols Workshop.

[5]  Panagiotis Katsaros,et al.  Probabilistic model checking for the quantification of DoS security threats , 2009, Comput. Secur..

[6]  Reijo Savola Node Level Security Management and Authentication in Mobile Ad Hoc Networks , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[7]  Fayez Al-Shraideh,et al.  Host Identity Protocol , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).

[8]  Pekka Nikander,et al.  Host Identity Protocol , 2005 .

[9]  Gabriel Montenegro,et al.  Crypto-based identifiers (CBIDs): Concepts and applications , 2004, TSEC.

[10]  Claude Castelluccia,et al.  Hierarchical Mobile IPv6 Mobility Management (HMIPv6) , 2005, RFC.

[11]  Michael Roe,et al.  Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.

[12]  Basavaraj Patil,et al.  Proxy Mobile IPv6 , 2008, RFC.

[13]  Maryline Laurent-Maknavicius,et al.  Inter-domain security for mobile IPv6 , 2002, 2nd European Conference on Universal Multiservice Networks. ECUMN'2001 (Cat. No.02EX563).

[14]  P. Jokela,et al.  Handover performance with HIP and MIPv6 , 2004, 1st International Symposium onWireless Communication Systems, 2004..