Improving security and mobility for remote access: A wireless sensor network case

Ubiquitous Computing is a new Internet revolution that will allow, among other uninterrupted access to the network actors machines and some mobile devices. In this paper, the example of mobile laboratory is composed a Wireless Sensor Network (WSN) whose the data collection is done through a special node called master. HIP (Host Identity Protocol) is used as communication protocol. The HIP architecture uses the identity/locator split. In the proposed architecture, mobility is managed by three entities including mobile node (master), locator manager or fLRVS (firewall and Local Rendezvous Server), access link manager or S-RVS (Subnet Rendezvous Server). The new introduced network entity is fLRVS, it is responsible for the node accessibility in the domain and filtering based on the HI (Host Identifier). The node identifier named HI, is the public key of an asymmetric key-pair. The HIP Registration and HIP Rendezvous Extension have been modified to achieve this authentication system. A proposed mobility scheme, named HIPdisass, is based on a proactive handover mechanism which reduce latency and packet loss. At outside, remote hosts can connect to the mobile laboratory safely regardless of the type of access network.

[1]  Lars Eggert,et al.  Host Identity Protocol (HIP) Registration Extension , 2016, RFC.

[2]  Pekka Nikander,et al.  End-Host Mobility and Multihoming with the Host Identity Protocol , 2008, RFC.

[3]  Wei Luo,et al.  Layer 2 Virtual Private Network (L2VPN) Extensions for Layer 2 Tunneling Protocol (L2TP) , 2006, RFC.

[4]  Mohammad S. Obaidat,et al.  Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks , 2013, The Journal of Supercomputing.

[5]  Pekka Nikander,et al.  Host Identity Protocol (HIP) Architecture , 2006, RFC.

[6]  Andrei Gurtov Host Identity Protocol (HIP): Towards the Secure Mobile Internet , 2008 .

[7]  Lars Eggert,et al.  Host Identity Protocol (HIP) Rendezvous Extension , 2016, RFC.

[8]  H. Anthony Chan,et al.  Inter-subnet localized mobility support for host identity protocol , 2011, EURASIP J. Wirel. Commun. Netw..

[9]  Pekka Nikander,et al.  Host Identity Protocol , 2005 .

[10]  Tuomas Aura,et al.  Analysis of the HIP Base Exchange Protocol , 2005, ACISP.

[11]  Mingyan Liu,et al.  Design of Low Data-Rate Environmental Monitoring Applications , 2014 .

[12]  Andrei Gurtov,et al.  Next-Generation Internet Architectures and Protocols: Host identity protocol (HIP): an overview , 2011 .

[13]  Glen Zorn,et al.  Securing L2TP using IPsec , 2001, RFC.

[14]  Jan Melén,et al.  Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP) , 2008, RFC.

[15]  John Krumm,et al.  Ubiquitous Computing Fundamentals , 2009 .