HIMALIS-VI: Fast and Secure Mobility Management Scheme Based on HIMALIS for V2I Services in Future Networks

To overcome the inherent limitations of the current Internet architecture, such as lack of mobility support and security mechanism, research has begun on future Internet based on ID/locator split architecture. For the realization of future networks, it is necessary to consider the characteristics of their services and applications, as well as research on their basic architectures. The representative services include Cooperative Intelligent Transportation System (C-ITS) applications based on vehicle-to-vehicle/vehicle-to-infrastructure (V2V/V2I) communication which can prevent vehicular accidents, increase the efficiency of transportation systems, and reduce environmental pollution, all while improving passenger convenience. Since C-ITS services using V2I communication are tightly connected to both passenger and pedestrian safety, they require not only continuous network access but also secure communication regardless of the vehicle mobility. To provide continuous network access and secure communication to moving vehicles in future networks based on an ID/locator split approach, authentication and location updates of moving vehicles should be frequently performed, which results in significant signaling overhead. Therefore, to integrate V2I communication with an ID/locator split approach based on the (R1) HIMALIS architecture, in this paper we propose a novel mobility management scheme, called HIMALIS-VI, which can contribute to a delay reduction for the authentication and mitigating handover procedures at both the mobile hosts and network entities in an edge network.

[1]  Mahbub Hassan,et al.  The Throughput-Reliability Tradeoff in 802.11-Based Vehicular Safety Communications , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[2]  Eylem Ekici,et al.  Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.

[3]  Luca Delgrossi,et al.  IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[4]  Panagiotis Papadimitratos,et al.  SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.

[5]  T. Charles Clancy,et al.  Handover Key Management and Re-Authentication Problem Statement , 2008, RFC.

[6]  T. Charles Clancy Secure handover in enterprise WLANs: capwap, hokey, and IEEE 802.11R , 2008, IEEE Wireless Communications.

[7]  Thomas Narten,et al.  IPv6 Stateless Address Autoconfiguration , 1996, RFC.

[8]  Ved P. Kafle,et al.  Introducing multi-ID and multi-locator into network architecture , 2010, 2010 ITU-T Kaleidoscope: Beyond the Internet? - Innovations for Future Networks and Services.

[9]  Gilbert Moïsio,et al.  Internet Engineering Task Force , 2014 .

[10]  James W. Moore,et al.  Institute of Electrical and Electronics Engineers (IEEE) , 2002 .

[11]  Hans-Joachim Fischer,et al.  EU-US standards harmonization task group report : status of ITS communication standards. , 2012 .

[12]  Guillermo Acosta-Marum,et al.  Wave: A tutorial , 2009, IEEE Communications Magazine.

[13]  Hiroaki Harai,et al.  Design and Implementation of Security for HIMALIS Architecture of Future Networks , 2013, IEICE Trans. Inf. Syst..