Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks

In the very near future, we shall witness the coexistence of networks with heterogeneous link layer technologies. Such networks will naturally overlap each other and mobile users will need to frequently handoff among them for a number of reasons, including the quest for higher speeds and/or lower cost. Handoffs between such hybrid networks should be fast enough to support demanding applications, like multimedia content delivery, but also secure enough since different network providers are involved. This gets even more complicated considering that network providers may not simultaneously be multimedia service providers as it is the case today. In order to support security operations in a large scale the employment of an AAA protocol is mandated; however, this adds more delay to the handoff process. This article analyses and compares the prominent methods proposed so far that optimize the secure handoff process in terms of delay and are suitable for uninterruptible secure multimedia service delivery.

[1]  寺岡 文男,et al.  Protocol for carrying Authentication for Network Access (PANA) を利用したネットワークアクセス認証システムの実装と検証 , 2007 .

[2]  Tao Zhang,et al.  MPA assisted optimized proactive handoff scheme , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[3]  James Kempf,et al.  Problem Description: Reasons For Performing Context Transfers Between Nodes in an IP Access Network , 2002, RFC.

[4]  X. Fu,et al.  Secure, QoS-Enabled Mobility Support for IP-based Networks , 2003 .

[5]  Charles E. Perkins,et al.  IP Mobility Support for IPv4 , 2002, RFC.

[6]  Anand R. Prasad,et al.  Fast authentication methods for handovers between IEEE 802.11 wireless LANs , 2004, WMASH '04.

[7]  Christos Politis,et al.  AAA context transfer for seamless and secure multimedia services over All-IP infrastructures , 2004 .

[8]  Sajal K. Das,et al.  Mobility management for VoIP service: Mobile IP vs. SIP , 2002, IEEE Wirel. Commun..

[9]  Henning Schulzrinne,et al.  Application-layer mobility using SIP , 2000, MOCO.

[10]  Ashutosh Dutta,et al.  Secured Seamless Convergence across Heterogeneous Access Networks , 2006 .

[11]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[12]  Michael Roe,et al.  Reducing Reauthentication Delay in Wireless Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[13]  Miguel A. Garcia-Martin,et al.  Diameter Session Initiation Protocol (SIP) Application , 2006, RFC.

[14]  Chong-Sun Hwang,et al.  Efficient mobility management for multimedia service in wireless IP networks , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).

[15]  Jukka Manner,et al.  Mobility Related Terminology , 2004, RFC.

[16]  Dan Forsberg,et al.  Protocol for Carrying Authentication for Network Access (PANA) , 2008, RFC.

[17]  William A. Arbaugh,et al.  Proactive key distribution using neighbor graphs , 2004, IEEE Wireless Communications.

[18]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[19]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[20]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[21]  Yanghee Choi,et al.  FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN , 2002 .

[22]  Paal E. Engelstad,et al.  Authenticated access for IPv6 supported mobility , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[23]  Adam Wolisz,et al.  A performance study of session state re-establishment schemes in IP-based micro-mobility scenarios , 2004, The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. (MASCOTS 2004). Proceedings..

[24]  Hossam Afifi,et al.  Toward Ecient Mobile Authentication in Wireless Inter-domain , 2003 .

[25]  Victor Fajardo,et al.  Diameter Base Protocol , 2003, RFC.

[26]  Xiaomin Zhu,et al.  Optimized Integrated Registration Procedure of Mobile IP and SIP with AAA Operations , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[27]  Hahnsang Kim,et al.  Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[28]  Walid Dabbous,et al.  Improving Cross-domain Authentication overWireless Local Area Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[29]  Jaecheol Ryou,et al.  Consideration of UMTS-WLAN seamless handover , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[30]  Claude Castelluccia,et al.  Hierarchical Mobile IPv6 Mobility Management (HMIPv6) , 2005, RFC.