Conference PaperPDF Available

Virtual ID: A Technique for Mobility, Multi-Homing, and Location Privacy in Next Generation Wireless Networks

Authors:

Abstract

Cellular networking standards organizations such as the 3<sup>rd</sup> Generation Partnership Project (3GPP) are currently developing System Architecture Evolution (SAE) as their core network architecture. SAE is all-IP based. However, IP-based networks face several known issues, such as mobility, multi-homing, location privacy, path preference, etc. Mobile IP (MIP) and its variants, such as Mobile IPv6 (MIPv6), Hierarchical MIP, and Proxy MIP, have been developed primarily to alleviate the mobility problem. These variation and extensions, however, still do not provide many of the features required in Next Generation Wireless Networks (NGWN). The limitations are especially due to the overloading of IP addresses as both node identity and locator. In this paper, we propose an extension to MIPv6 called Virtual ID. This concept applies the ID/Locator split idea into a Mobile IPv6 environment. Virtual ID and its extensions provide many features that would be desired in the NGWN. Since our proposed scheme is based on the standard MIPv6 and Proxy MIPv6, the scheme is fully compatible with the legacy MIPv6.
Abstract—Cellular networking standards organizations such
as the 3rd Generation Partnership Project (3GPP) are currently
developing System Architecture Evolution (SAE) as their core
network architecture. SAE is all-IP based. However, IP-based
networks face several known issues, such as mobility, multi-
homing, location privacy, path preference, etc. Mobile IP (MIP)
and its variants, such as Mobile IPv6 (MIPv6), Hierarchical MIP,
and Proxy MIP, have been developed primarily to alleviate the
mobility problem. These variation and extensions, however, still
do not provide many of the features required in Next Generation
Wireless Networks (NGWN). The limitations are especially due
to the overloading of IP addresses as both node identity and
locator. In this paper, we propose an extension to MIPv6 called
Virtual ID. This concept applies the ID/Locator split idea into a
Mobile IPv6 environment. Virtual ID and its extensions provide
many features that would be desired in the NGWN. Since our
proposed scheme is based on the standard MIPv6 and Proxy
MIPv6, the scheme is fully compatible with the legacy MIPv6.
Index Terms—Mobile IP, Virtual Identity, Mobility, Multi-
Homing, User Location Privacy, NGWN, ID/Locator Split.
I. INTRODUCTION
ystem Architecture Evolution (SAE) is the core
networking architecture being developed by the 3rd
Generation Partnership Project (3GPP) [1] for the next
generation of cellular wireless networks. SAE is all-IP based.
In this paper, we discuss issues that the next generation
wireless networks (NGWN) will face after SAE deployment.
We call these post-SAE networks. These networks, which will
result from converging wired and wireless networks, will
include a variety of wireless technologies such as cellular
networks (2G/3G/4G), wireless broadband networks (e.g.,
Mobile WiMAX and LTE), wireless sensor networks, and so
on. The interoperability among traditional wired networks,
such as Ethernet, and wireless technologies also needs to be
maintained. The applications on these networks may include
voice, video, TV broadcasting, online games, and data
services with a guaranteed quality of service (QoS).
With the emergence of billions of mobile users and wireless
devices, scalability and deployability issues arise and will
Manuscript received September 7, 2009, revised October 15, 2009.
Corresponding authors: C. So-In, R. Jain, S. Paul, and J. Pan are with the
Computer Science and Engineering Department, Washington University in St.
Louis, MO 63143 USA (e-mail: cs5, jain, paul, and jp10@cse.wustl.edu).
need to be considered when designing the next generation
networks. Compared to wired networks, the channel capacity
in wireless networks is not constant over time and distance. In
addition, mobile users may move from one location to another
at a high speed. As a result, disruptions may occur more
frequently. Therefore, mobility is clearly one of the key issues
in the NGWN.
With the advance of networking technologies, multiple
networking interfaces with different combination of wired and
wireless technologies are becoming common. So the issue of
multi-homing, especially device and user multi-homing, will
play an important role in backup, load balancing, sharing, and
traffic engineering in future networks. The networks are
becoming more user-centric, that is, they will allow users to
make their own decisions. Network service providers may
only provide suggestions with inherent security. For example,
with multiple networking interfaces in a single mobile device,
the mobile users may choose their preferred paths for each
task, probably based on the price paid and on the quality of the
service offered by various service providers. The users may be
required to pay air-time charges, similar to a traditional
cellular phone system. In addition, users may want to keep
their location information private from their correspondent
users. This is the so-called user location privacy issue. Finally,
the security of data is always of concern to users.
The issues we have described above: mobility, multi-
homing, scalability, security, deployability, and user location
privacy, are key required for the design of next generation
networks. Since future networks are expected to be all-IP
based, the question is how to make them support these
features.
There have been many attempts to resolve some of these
key issues, especially in traditional all-IP based wired-
networks [2, 3, 4]. However, no clear consensus has been
reached. The problem is more serious within the mobile
wireless environment. In the current Internet, the main hurdle
in resolving the mobility and multi-homing issues is the
overloading of IP addresses as both identity and location [2,
3]. The techniques to resolve these problems are based on
redirection and indirection techniques [2, 3]. The main
differences among these techniques are their varying focuses
on the different protocol layers, on the introduction of new
naming spaces, on the required changes of a protocol stack,
and on the ways to separate a host’s identity from its locator.
We will briefly discuss the detailed concepts. Mobile IP [5 to
9] is another well known approach primarily designed to
Virtual ID: A Technique for Mobility, Multi-
Homing, and Location Privacy in Next
Generation Wireless Networks
Chakchai So-In, Student Member, IEEE, and Raj Jain, Fellow, IEEE
Subharthi Paul and Jianli Pan, Student Members, IEEE
S
U.S. Government work not protected by U.S. copyright
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2010 proceedings
Proceedings of 2nd IEEE International Workshop on Mobile IPv6 and Network-based Localized Mobility
Management (MobiWorld’10), In Conjuction with 7th Annual IEEE Consumer Communications and Networking
Conference (CCNC 2010), Las Vegas, Nevada, USA, January 9th, 2010
resolve the mobility issue. However, Mobile IP and its
extensions fail to fully support important other features for
NGWN.
In this paper, our focus is on a network layer approach to
mobility. A key advantage of this approach is that the
network-layer based solutions require no change in the higher
layers of the protocol stack, and so the solutions work for all
applications. We apply the ID/locator split idea explicitly into
the Mobile IP, especially for a mobile wireless environment.
We introduce Virtual ID as a node identity for the mobile user.
This add-on feature makes Mobile IPv6 to fully support
mobility, multi-homing, and user location privacy. This
concept and its extensions are built on the standard Mobile
IPv6 and Proxy MIPv6. Note that several other proposals
focus on scalability (e.g., the use of DNS and provider-
aggregatable addresses) and security, such as IPsec and secure
Mobile IP signaling. We do not handle these issues in this
paper.
This paper is organized as follows. In Section II, we briefly
describe the general concept of ID/locator split approaches as
well as the pros and cons of these approaches in terms of
mobility, multi-homing as well as user path preference, and
user location privacy. In Section III, we discuss Mobile IPv6
and its variants considering these criteria. Then, in Section IV
we introduce Virtual ID and its extensions by applying the
concept of the ID/locator split into Mobile IPv6, to fully
support user mobility, multi-homing as well as user path
preference, and user location privacy. We illustrate these
Virtual ID ideas with several detailed examples in Section V.
Finally, the conclusions are discussed in Section VI.
II. ID/LOCATOR SPLIT
The ID/locator split [5, 6] is a well-known approach used to
resolve both mobility and multi-homing issues. Basically, the
idea is to separate the functionality of the identity from that of
the locator. Each mobile node (MN) has its own unique
identity. When the node moves, its identity does not change,
but its locator does. The identity can be a string of characters
or digits. The locator represents the current point of
attachment to the network. In other words, the locator helps
decide where the packet should be routed.
Currently, there are two ways to implement an ID/locator
split: placing a split in the end host (e.g., HIP, SHIM6, and
MILSA, etc. [2]) or in the network (LISP [2]). The former
approach requires the insertion of a new ID sub-layer usually
between the transport and the network layers. Thus, the upper
layers are bound to an ID instead of locator. HIP and MILSA
introduce new secure naming spaces but SHIM6 uses one of
its current locators as the identity.
Note that although these splitting techniques can support
full mobility, multi-homing, and location privacy since the
identity is used instead of the node location, such indirection
mechanisms also require new naming and name resolution
mechanisms. In addition, there is no detailed discussion of the
path selection issue. The second set of splitting techniques
implements an ID/locator split in the network. The basic idea
is that there is no change to the end host. The routers take care
of the split. At the edge of the network, the IDs are resolved
into the locators needed for communication. This requires
changes to network infrastructure devices (routers).
III. MOBILE IPV6 AND ITS VARIANTS
Mobile IP (MIP) [5, 6] and its variants are well-known
techniques designed to resolve the mobility problem in
traditional wired and wireless networks. 3GPP has adopted
these concepts for System Architecture Evolution (SAE).
Most of the concepts discussed in this paper apply to both
IPv4 and IPv6. However, for simplicity, we limit our
discussion to IPv6 since it has sufficient address space and is
preferred for public wireless networks.
Consider mobility. If nodes change their networks and/or
locations, then their IP addresses also change. Consequently,
their TCP connections at the transport layer are broken. The
Mobile IPv6 is potentially used to maintain the connection
and/or session regardless of time and location with an IP-in-IP
encapsulation technique. In other words, the Mobile IPv6 is
used to preserve the connection.
Briefly, the Mobile IPv6 functions as follows: the node’s
home IP address is used as the node’s identity. When the node
moves from one network to another network, it informs its
home network (home agent, HA) about its new IP address
(care-of-address or CoA). In case a correspondent node (CN)
wants to contact this node, the CN sends packets to the home
network; the packet is intercepted by the home agent and
forwarded to the mobile node’s new address (CoA).
Several extensions of Mobile IP have been proposed to
mitigate the route-to-home network delay and/or hand-off
latency such as HAWAII, Cellular IP, and HMIP (Hierarchical
MIP) [7]. These approaches deploy several home agents in a
hierarchical manner, especially at the edge routers. With
HMIP, the binding update is sent to the local HA, which
decreases delay latency. However, these approaches require
synchronization among HAs and additional nodes.
Proxy-MIP [8] was originally introduced to improve the
deployability of MIP. The idea is to use the router or proxy
agent to act on behalf of the mobile node and to perform the
MIP functionality. In other words, with the Proxy-MIP, the
mobile node does not need to support the MIP.
Now let us consider multi-homing and user path preference.
Mobile IPv6 can’t support multi-homing because each single
mobile node is bound to only one IP address. Recently, some
have suggested allowing multiple care-of-addresses
registrations [9] to allow multi-homing. There is no detailed
discussion on user path selection issue.
Consider user location privacy. When nodes move away
from their home networks, Mobile IP implicitly supports
location privacy because the current location is no longer
bound to the home address. However, this scenario introduces
a triangular routing problem as indicated earlier. This problem
can be mitigated using HMIP to reduce the delay latency by
placing the home agent close to both the MN and the CN. In
Mobile IPv6, a route optimization feature was introduced to
resolve this triangular routing problem, that is, to allow the
MN and CN to communicate to each other directly. But again,
this direct communication introduces the user location privacy
issue for mobile users.
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2010 proceedings
In summary, a traditional Mobile IPv6 and its variants -
Proxy MIPv6 and Hierarchical MIPv6 - fail to provide a full
support for mobility, multi-homing, and user location privacy.
In next section, then we introduce the concept of Virtual ID
and its extensions to overcome these drawbacks of the
traditional Mobile IPv6 by applying the concept of ID/locator
split explicitly to a Mobile IPv6 environment.
IV. VIRTU AL ID AND ITS EXTENSIONS
In this section, we first describe the idea of Virtual Identity
(ID) applied to Mobile IPv6. We also discuss how to apply
this concept to solve two different problems: user location
privacy and multi-homing.
A. Virtual ID
In IPv6, a 128-bit address is used for both node identity and
locator which introduces many disadvantages, as indicated
earlier. In a mobile wireless environment, Mobile IPv6 also
mixes these functionalities. When the mobile node is in the
home network, a single IPv6 home address represents both
node identity and locator. But when the mobile node is outside
the home network, Mobile IPv6 can be treated as an
ID/Locator split scheme because another IP address, CoA, is
involved. This CoA can be treated as the node locator (the
indicator of where the node is). The node’s home address does
not change with its location and, therefore, serves as the
node’s identity.
To clearly separate the function of identity from that of
locator in Mobile IPv6, we introduce the concept of a “virtual
home address”. Similar to SHIM6, this 128-bit address format
is used to represent the node’s identity. However, we do not
use one of the node current addresses as its identity. Instead,
we use the virtual home address, called virtual ID.
The virtual ID is pre-defined and randomly assigned by the
service provider. This ID is permanent and thus no longer
bound to the home networks and/or locations. In other words,
the virtual ID is used even when the mobile node resides in the
home network. As in Mobile IPv6, the IP-in-IP encapsulation
is applied in that the nodes update their CoAs when they are in
different location/networks.
We use the 128-bit IPv6 address format to represent the
node’s identity. This allows backward compatibility since
legacy nodes (virtual ID unaware nodes) treat these identities
as addresses.
B. User Location Privacy
The concept of the virtual ID formed by separating the node
identity from its location helps to resolve the issue of user
location privacy in that the correspondent nodes do not know
the location of the mobile node; only the node identity. Note
that basically there are two levels of mapping: from node
name (FQDN) to node identity, and then from node identity to
node location. The result of the DNS resolution is the node’s
identity, not its location. The other mapping level can be done
at rendezvous servers. In a Mobile IPv6 environment, the
home agent does the second level mapping. With Virtual ID,
an additional mapping from the virtual home address to the
Mobile IPv6 home address is also required. Optional
additional mapping servers or extensions of the home agent
can do this mapping.
The correspondent nodes are required to send the packets
through the mobile node’s home network. Therefore, there is a
triangulation issue, as discussed earlier. To solve this problem,
we propose an add-on feature to Proxy Mobile IPv6 [9].
Traditionally, in Proxy MIPv6, a mobile access gateway or
proxy node is used to provide Mobile IP functionality on
behalf of Mobile-IP unaware nodes. In this add-on, the mobile
nodes no longer require the location information; instead the
proxy node does this work. The proxy can optionally rewrite
the address with its selected anonymity proxy address to hide
the exact location or CoA in case the Mobile IP functionality
is performed at the end node.
C. Multi-Homing
In NGWN, mobile users will want to exercise user path
selection because they will have to pay for their choices
according to bandwidth constraints and other quality of
service controls. For example, suppose Alice buys access
services from two different service providers: one services a
3G network accessible to her cellular phone; the other is over
WLAN. When she is at home or when WLAN is available,
Alice would prefer accessing the Internet service through
WLAN and also probably disable the 3G service, especially
when air-time charges are high.
To meet these requirements of multi-homing and user path
selection, again a 128 bits Virtual ID is used as the unique
identity. We do not change the identity regardless of the
networks and/or locations. Only the physical locations or care-
of-addresses can be changed with a change of locations.
Unlike SHIM6, we do not change the protocol stack, but
instead we apply the concept of multiple CoAs registrations at
the home agent to support multi-homing feature [9].
In NGWN, users should be able to choose both their own
ingress and egress paths, based on the price paid and the
quality of service constraints. For simplicity, we use a weight
factor along with the CoA registration when the nodes update
the address to the home agent. In a more general case, the
users could specify a set of connection rules. The home agent
will forward the packets to the node according to pre-selected
user path rules.
V. VIRTU AL ID AND ITS EXTENSIONS: EXAMPLES
In this section, we provide detailed examples for the Virtual
ID concept and its extension. For user location privacy, we
show that the concept of Virtual ID can protect the user
location information. We also show that home agent chaining
can be used to support user and/or device multi-homing as
well as how to support a user path selection feature.
A. Virtual ID Example
Fig. 1 shows an example of Virtual ID. In this figure,
Alice’s node’s name is Alice.xyz.com registered at a domain
name server or DNS. The service provider (SP) allocates a
virtual address (Virtual ID), ::10.2.1.2, as Alice’s identity.
Suppose the SP networks are ::10.x.x.x with ::10.3.x.x and
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2010 proceedings
::10.4.x.x sub-networks assigned into different physical
regions. The virtual addresses ::10.2.x.x are specifically
dedicated as the virtual ID. Only the SP knows the mapping
between the virtual ID or node identity (::10.2.1.2) and the
physical address (::10.3.1.2) or current IP address. This
mapping can be stored at rendezvous servers.
Alice.xyz.com
Virtual ID, ::10.2.1.2
DNS
Alice.xyz.com
::10.2.1.2
::10.2.1.2 ::10.3.1.2
Mapping Server
HoA (Virtual ID):
Assigned regardless of location
::10.3.x.x
::10.4.x.x
SP1 ::10.x.x.x
Fig. 1. Virtual ID Example
B. User Location Privacy Example
This section describes two main scenarios that use Virtual
ID to achieve a user location privacy requirement in NGWN:
when the correspondent code (CN) resides either out of the
home network or inside the home network.
Alice.xyz.com
Virtual ID, ::10.2.1.2
Liza.abc.com
::11.1.1.2
::10.2.1.2 ::10.3.1.2
Mapping Server
SP 1
SP 2
DNS
Liza.abc.com ::11.1.1.2
Alice.xyz.com ::10.2.1.2
Fig. 2. Virtual ID with User Location Privacy Example
The first scenario is when the node is in a different network.
Fig. 2 shows the correspondent node or Liza.abc.com in SP2
contacting Alice.xyz.com, which is in SP1. First, Liza retrieves
Alice’s identity, ::10.2.1.2, from a DNS resolution process and
uses that ID to route packets to Liza’s home network. Since
Alice’s ID is used instead of her physical attached address,
::10.3.1.2, Alice’s location privacy can be maintained. Notice
that if Alice is in foreign networks, her user location privacy is
implicitly maintained. This scenario is similar to a traditional
Mobile IPv6 because the permanent home address is different
from the virtual ID.
The other scenario is when Liza is within the same network,
say in an SP1 network, with ::10.x.x.x networks. Suppose
Liza’s address is ::10.4.1.2 and again Alice is at ::10.3.1.2,
within her home network. With a traditional Mobile IPv6, Liza
knows where the current location of Alice is. However, with
Virtual ID, Alice’s identity is used instead, ::10.2.1.2;
therefore, Liza no longer knows Alice’s location information.
C. Proxy-assisted User Location Privacy Example
Fig. 3 shows an example of Proxy-assisted Mobile IPv6 and
Virtual ID providing user location privacy. In this figure, Liza,
a correspondent node, wants to contact Alice, who is not in her
own home network. Note that the proxy will do both the
binding update and the Mobile IP functionality on behalf of
the mobile nodes. The binding update refers to a pairing of the
virtual ID and the proxy locator: ::9.1.1.2 and ::11.5.1.1 for
Liza and ::10.1.1.2 and ::12.5.1.1 for Alice. Liza does not
know Alice’s location and vice versa. Notice that each proxy
has local node location information so that the proxy can
forward the packets to the correct final destination.
Alice.xyz.com
Virtual ID, ::10.1.2.2
Locator, ::12.3.1.2
DNS
Liza.abc.com ::9.1.1.2
Alice.xyz.com ::10.1.1.2
Proxy1
Locator, ::11.5.1.1 Proxy2
Locator, ::12.5.1.1
Liza.abc.com
Virtual ID, ::9.1.1.2
Locator, ::11.3.1.1
Alice Home Network
::10.x.x.x
Fig. 3. Proxy-assisted User Location Privacy Example
D. Multi-Homing Example
In this section, we provide the details of how to incorporate
the multi-homing feature into NGWN. Our proposal is based
on home agent chaining among service providers.
We consider two main scenarios: when the multi-homing
attachments are either to the same service provider or to
different service providers.
SP1 ::12.x.x.x
Alice.xyz.com
Virtual ID, ::12.3.1.2
::12.2.1.2
::12.1.1.2
HA
Alice.xyz.com
Virtual ID, ::12.3.1.2
CoAs, ::12.2.1.2 w=1
::12.1.1.2 w=2
If move/change preference
update CoAs
Fig. 4. Multiple CoAs Registration Example
The first scenario, Fig. 4 shows the process of multiple
CoAs registrations with the preferred path selection when both
networking attachment points are with the same service
provider (SP1). In this figure, Alice has two access
technologies with the same service provider (::12.x.x.x):
toward cellular networks and toward WLAN on her single
mobile device. Alice’s virtual ID is::12.3.1.2, and the two
physical locators or CoAs are ::12.2.1.2 (on a 3G network),
and ::12.1.1.2 (on WLAN). When Alice is at home, she can
send the update to her home agent to set a higher priority
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2010 proceedings
toward the WLAN interface so that the inbound traffic can be
forwarded toward this WLAN interface.
The other scenario is when mobile users have multiple
access services from different network providers. Fig. 5a
shows this configuration. As shown, Alice has two access
services from two different service providers: SP1 cellular
networks and SP2 WLAN. Since there are different SPs, Alice
can acquire two different virtual IDs. Alice can send the
update to the DNS server with her preferred path selections
(with different weights). In this scenario, Alice is at home and
she prefers the WLAN path (with a higher weight, or higher
priority), which is toward SP2 or ::11.x.x.x networks.
SP 1
::10.x.x.x
SP 2
::11.x.x.x
Alice.xyz.com
Virtual ID, ::10.3.1.2
::11.3.1.2
::10.1.1.2
::11.1.1.2
DNS
Alice.xyz.com
::10.3.1.2 w=1
::11.3.1.2 w=2
HA1 HA2 Mapping
::11.3.1.2 ::11.1.1.2
Mapping
::10.3.1.2 ::10.1.1.2
(a)
SP 1
::10.x.x.x
SP 2
::11.x.x.x
DNS
Alice.xyz.com
::10.3.1.1 w=1
::11.3.1.1 w=2
HA1 HA2
::10.1.1.2
::11.1.1.2
Liza.abc.com
::10.5.1.2
Alice.xyz.com
Virtual ID, ::10.3.1.2
::11.3.1.2
(b)
Fig. 5. Multi-homing Feature in Mobile IPv6 with Virtual ID Example
Note that the CoA address of Alice on the SP2 network is
::11.1.1.2, not the Virtual ID ::11.3.1.2. In this scenario, the
packets are sent only towards WLAN as long as Alice does
not update her preferred path on its DNS. There are no
requirements for cooperation and interaction between two
service providers.
When WLAN is not working, as shown in Fig. 5b, either
SP2 or Alice can detect the disconnection. Without the
interaction between the SPs, the packets can continue to flow
to SP2 until Alice sends the update to the DNS server.
Therefore, an additional operation is required. We recommend
the concept of home agent chaining. Similar to the cellular
phone system roaming mechanism, both service providers
should have an agreement based on their user roaming policy
to provide a packet forwarding mechanism. In this example,
suppose SP1 and SP2 have a roaming agreement, and mobile
users agree to pay for the additional cost of roaming.
During the disconnection, the steps in Fig. 5 are as follows:
Liza, ::10.5.1.2, originally sends her packets to Alice through
SP2. Due to a link failure, the WLAN interface of Alice is
unreachable. After the link failure detection, HA2 (from SP2)
redirects all packets with Alice indicated as the destination to
HA1 in order to reach Alice. Again, this redirection is based
on a roaming policy. Whenever Alice sends the update to the
DNS server to withdraw the disconnected path and/or to set a
lower preference, this redirection will be terminated. Note that
this example shows two service providers; however, the
chaining concept can still apply with more service providers
with multiple networking interfaces.
VI. CONCLUSIONS
Next Generation Wireless Networks, or NGWN, will be a
cloud of all IP-based networks. The main features of these
networks will be to fully support user mobility, multi-homing,
user location privacy, and so on. Mobile IP and its variants
have been introduced to resolve some of these issues. These
proposals focus on a network layer technique. Some of these
techniques have been selected by 3GPP for the System
Evolution Architecture standard. However, these techniques
have several limitations, especially due to the problem of
identity and locator overloading.
In this paper, we discussed Mobile IP and its variants and
also pointed out several drawbacks. In addition, we introduced
a new technique called Virtual ID and its extensions, to make
the Mobile IP fully support mobility, multi-homing, and user
location privacy as well as user path selection. These add-ons
are based on the standard Mobile IPv6 and its extensions and
are therefore easy to be deployed along with Mobile IPv6.
REFERENCES
[1] 3GGPP TS 23.402 V8.0.0 3rd Generation Partnership Project; Technical
Specification Group Service and System Aspects; Architecture
enhancements for nono-3GPP accesses, Dec. 2007, 131 pp.
[2] R. Jain, “Internet 3.0: Ten Problems with Current Internet Architecture
and Solutions for the Next Generation,” in Proc. IEEE Military Comm.
Conf., 2006, pp. 1-9.
[3] C. So-In, R. Jain, J. Pan, and S. Paul, “Next Generation Wireless
Networks: key issues and survey,” Submitted to EUSASIP Journal on
Wireless Communicaiton and Networking, Oct. 2009.
[4] S. Paul, J. Pan, and R. Jain, “A Survey of Naming Systems:
Classification and Analysis of the Current Schemes Using a New
Naming Reference Model,” To appear in Computer Communicatoin,
May 2010.
[5] C. Perkins, Ed., “IP Mobility Support for IPv4,” RFC 3220, Jan. 2002.
[6] D. Johonson, C. Perkins, and J. Arkko, “Mobility Support in IPv6,” RFC
3775, June 2004
[7] A.T. Campbell, J. Gomez, K. Sanghyo, W. Chieh-Yih, Z.R. Turanyi,
and A.G. Valko, “Comparison of IP micromobility protocols,” IEEE
Wireless Comm. Mag., vol. 9, no. 1, pp. 72-82, Feb. 2002.
[8] S. Gundavelli, Ed. K. Leung, V. Devarapalli, K. Chowdhury, and B.
Patil, “Proxy Mobile IPv6,” RFC 5213, Aug. 2008.
[9] R. Wakikawa, V. Devarapalli, G. Tsirtsis, T. Ernst, and K. Nagami,
“Multiple Care-of Addresses Registration,” Internet-Draft, draft-ietf-
monami6-multiplecoa-14.txt, May 2009.
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2010 proceedings
... FWNs are evolving into an ubiquitous network in which customers or users will not need to be aware of the differ-ent behaviours and/or characteristics of the networking media underneath their applications [1]. Moreover, a policy-based control would be necessary to make use of multiple interfaces [2][3][4][5] in an efficient way. ...
... FWNs may provide a guaranteed service with an agreement on the quality of service (QoS) control, as well as best-effort services. In addition, the emergence of billions of networkable mobile wireless devices, which may outnumber the wired PC's as early as 2010 [4], including Laptops, PDAs (Personal Digital Assistants), cell phones, wireless sensors, etc., shall exacerbate the problem of scalability in the current networks. Moreover, with the advances in networking technologies, the concept of a single user-single host-single interface will no longer be common in FWNs. ...
... Virtual Identifier: Especially for privacy purposes, the virtual identifier [4] is a representation of an identifier resulting from multiple levels of ID mapping or other mappings from the identifier to its locator, primarily to hide the actual ID. ...
Article
Full-text available
Future Wireless Networks (FWNs) will be a convergence of many fixed and mobile networking technologies including cellular, wireless LANs, and traditional wired networks. This united ubiquitous network will consist of billions of networkable devices with different networking interfaces. A common networking protocol is required to communicate among these devices and interfaces; System Architecture Evolution (SAE) documents state that Internet Protocol (IP), world-widely used in the current Internet, is likely to become that common protocol. However, traditional IP architecture has faced several known challenges, such as mobility, multihoming, privacy, path preference selection, etc., which should be resolved in FWNs. One of the difficulties in the current IP architecture is the overloading of IP addresses used both as the identity and the location of IP devices. In this paper, we propose a virtualization concept for networkable components, or (virtual) objects, which generalizes all abstract components to potentially be used in FWNs. In addition, we have explicitly separated the functions of the virtual object identity from the virtual object location (using the ID/locator split concept). The end-to-end communication is a concatenation of the involved components, called a channel. To help support the ownership and policy enforcement for trusted vs. untrusted networks, a set of (virtual) networkable components with the same interest, called a realm, is formed in a multi-tier structure. The individual policy can be enforced for each individual group of (virtual) objects and/or channels. This virtualization architecture concept, characterized by the ID/locator split concept, is well-suited for FWNs and helps eliminate problems in the current Internet.
... Thus, any development framework will need to support the heterogeneous networking. The current technology is evolving to such an extent that IoT will have applications of RFID enabled patient identification and real-time information management [4]. There is also the example of Smart Objects Internet, which is being used for expanding the smart objects by effectively cutting cost and maximizing the output. ...
... The existing methods for traffic management, surveillance, and control are not meeting the quality standards adequately in terms of cost, maintenance, performance, and support. The generation of ITMS has evolved in to four generations of having different timelines and different characteristics [4]. ...
Conference Paper
A new concept of Internet technology is fast emerging within the Internet domain as a successful extension to it has now knows to become Internet of Things (IoT). The concept of wireless devices with embedded systems has paved the way for improved Intelligent Systems in the field of IoT. Intelligent Systems life cycle has begun with the advancements in development of IoT. However, the vision of application development on the platform of IoT is still in nascent stages. Our visualization of IoT as billions of “things” connected to each other under normal, as well as smart “things”, will be used in every sphere of our lives. High rise in recorded traffic density, road accidents, and crisis faced in regulating effective management of traffic control in rural areas have concerned us to develop a smart solution in context to Intelligent Traffic Management Systems (ITMS). We adopted this architecture and framework to provide the adequate ecosystem for the design and development of ITMS, which has the capability to overcome the challenges of transportation management system.
... Thus, every time the end host moves to a new network and In this paper, we apply the ID/Locator Split idea [2,3], a well-known approach used to resolve the mobility and multihoming issues, into a Mobile IP environment. As in [4], Mobile IP [5,6] is treated as one of the ID/Locator Split schemes in that the Mobile IP home address (HoA) is used as the node identity and its care-of-address (CoA) as the locators. A home agent (HA) is a rendezvous server or the mapping server to resolve the identity from/to the locators. ...
... As in [4], we consider Mobile IP as one of the ID/Locator Split schemes in that 1) the splitting is at the end host, 2) its focus is on the network layer, 3) there is no new naming space required (for deployability purpose), and 4) no change is required in the protocol stack. When the MN is not in its home network, the MN's HoA is considered as the node identity and its CoAs as the locators. ...
Conference Paper
Full-text available
Next Generation Wireless Networks (NGWNs) will be the convergence of fixed and mobile networking technologies, e.g., Ethernet, Wireless LAN, 2G/3G/4G, etc. This united ubiquitous network will consist of billions of mobile devices, each with multiple networking interfaces. These interfaces may belong to a set of diverse link layer technologies. Internet Protocol (IP) shall potentially be used as the inter-networking protocol to bridge this diversity in the underlying wireless link-layer similar to the present wired Internet architecture. However, the traditional IP was not designed for wireless environments and, hence, faces several issues in mobility, multihoming, user path selection, etc. The basis of most of these issues lies in the problem of contextual overloading of IP addresses to serve as both locators and identifiers. The ID/Locator Split concept is a well-known approach to overcome this problem. Mobile IPv6 can be considered as an example of an ID/Locator Split mechanism in which the home address is used as the identity of the mobile node and its care-of-addresses (CoAs) are used as locators. Cellular networking standards organizations, e.g., the 3<sup>rd</sup> Generation Partnership Project (3GPP), have adopted the Mobile IP concept for next generation cellular networks to maintain the mobility in an all-IP network framework. Mobile IPv6 and its optimizations can achieve full mobility and deployability. Currently, Mobile IPv6 allows features such as multiple CoA registrations and flow binding options. Apart from mobility, these extensions provide a solution for user-multihoming. However, there is no standard mechanism to select the proper interfaces or to map CoAs underneath. In this paper, we propose a policy-based QoS framework for users to choose the best N interfaces that suit the requirements of their specific applications.
... Other transport control approaches include [34]. However, these are not sufficient to solve flow mobility due to the lack of identification of flows from the originating locations, leading to the design of identifier based approaches ( [33], [22], [37], [27]. ...
Preprint
The next generation Internet is deemed to be heterogeneous in nature and mobile devices connected to the Internet are expected to be equipped with different wireless network interfaces. As seamless mobility is important in such networks, handover between different network types, called vertical handover, is an important issue in such networks. While proposing standards like Mobile IPv6 (MIPv6) and Proxy Mobile IPv6 (PMIPv6) for mobility management protocols, one important challenge being addressed by IETF work groups and the research community is flow mobility in multi-homed heterogeneous wireless networks. In this paper we propose and analyze a block prefix mechanism for flow mobility in PMIPv6 and conducted extensive analytical and simulation studies to compare the proposed mechanism with existing prefix based mechanisms for flow mobility in PMIPv6 reported in terms of important performance metrics such as handover latency, average hop delay, packet density, signaling cost and packet loss. Both analytical and simulation results demonstrate that the proposed mechanism outperforms the existing flow mobility management procedures using either shared or unique prefixes.
... Moreover, in [11] an IP based framework for handling several issues like multi homing, roaming and location privacy for 4G networks has been designed. So that, a proxy protocol has been employed as a variation of the conventional mobile IPv6 networking protocol. ...
Article
In Wireless Mobile Networks (WMN), the proliferation of mobile devices and smart phones stimulates an array of personalized information services that exploits the user's personal data for processing. So, it is very significant to preserve the data privacy and protect the integrity of data of mobile users. However, as the WMN devices are heterogeneous and highly independent, it is challenging to achieve privacy protection and efficient authentication in better levels. With those concerns, this paper illustrates a new model called Enhanced Privacy Preserving- Anonymity Authentication (EPPAA) for protecting the user's personal information. Further, the model incorporates the effectiveness of Quantum- behaved Particle Swarm Optimization (QPSO) for selecting the node at middle of neighbours that are closer to the Serving Base Station (seBS). The ticket based anonymity authentication has been employed and the algorithm has been designed and implemented predominantly. For providing confidentiality over the communication, the query message is encrypted, by that way; the anonymous users could not claim the private data of the mobile users. Moreover, the proposed model is implemented and evaluated using the NS2 simulator. The experimentation has been analyzed with the parameters such communication overhead, authentication delay, success ratio, packet delay and compared with some existing privacy preserving models such as Kerberos based Authentication for Inter-domain Roaming (KAIR), Privacy Preserving Nearest Neighbor Queries(PPNNQ) and Efficient Mobile Authentication Scheme (EMAS). The results of the proposed EPPAA show that the model outperforms the traditional methodologies and provides better authentication and security to the user information on WMN. © 2019 International Journal of Intelligent Engineering and Systems.
... In this scheme, authors achieve mutual authentication and share a symmetric key between two anonymous network entities. In [11], So-In figured that the IP-based architecture of the 4G networks bring several problems such as mobility, multi-homing and location privacy. Therefore, they introduce a proxy protocol as a modification of the standard mobile IPv6 protocol. ...
Article
Full-text available
Long Term Evaluation Advanced (LTE-A) is the third generation partnership project for cellular network that allows subscribers to roam into networks ( i. e., the Internet and wireless connections) using special purpose base-stations, such as wireless access points and home node B. In such LTE-A based networks, neither base-stations, nor the Internet and wireless connections are trusted because base-stations are operated by un-trusted subscribers. Attackers may exploit these vulnerabilities to violate the privacy of the LTE-A subscribers. On the other hand, the tradeoff between privacy and authentication is another challenge in such networks. Therefore, in this paper, we propose two anonymous authentication schemes based on one-time pseudonyms and Schnorr Zero Knowledge Protocols. In-stead of the international mobile subscriber identity, these schemes enable the user equipment, base-stations and mobility management entity to mutually authenticate each others and update the location of the user equipment without evolving the home subscriber server. The security analysis demonstrate that the proposed schemes thwart security and privacy attacks, such as malicious, international mobile sub-scriber identity catching, and tracking attacks. Additional-ly, our proposed schemes preserve the location privacy of user equipment since no entity except the mobility management entity and Gate-Way Mobile Location Center can link between the pseudonyms and the international mobile sub-scriber identity. Also attackers have no knowledge about international mobile subscriber identity. Hence, the pro-posed schemes achieve backward/forward secrecy. Further-more, the performance evaluation shows that the proposed handover schemes impose a small overhead on the mobile nodes and it has smaller computation and communication overheads than those in other schemes.
... The aim is to accommodate those pre-requirements to support from billions to trillions of devices. Several research communities have proposed service oriented architecture mechanisms to deal with IoT and FI devices mobility and the separation of IDs/LOCs [2][3][4]; security, privacy, and trust [18]; and management and control of devices [1] [19]. Howev-er, to address those requirements more deeply, IoT and FI relationships need to be clearly determined [10]. ...
Conference Paper
We are designing a NovaGenesis Architecture Model to support Future Internet services, which are going to address some fundamental issues of the Internet of Things, such as address resolution, mobility, routing, scalability, security, and network control. The aim is to support trillion of things connect to the Internet. In NovaGenesis, we have presented a set of distributed systems where any information processing is seen as service. Services organize themselves based on names and agreements to meet semantics rich goals, policies, regulations, etc. Even networking functionalities are considered as services. Every existence could have one or more names: natural language names or self-certifying names. All the communication, processing, and storage are name-oriented. The protocol stacks are built on demand in a contract-based way. Hence, we can state that NovaGenesis architecture could be an alternative solution for current internet oriented innovations in a scalable manner. The aim of this architecture is the coverage of Internet and sensors oriented smart objects. The paper discusses the proposed model in the context of an Advanced Rural Transportation System.
Chapter
In transmitting mobile IPv6 binding update messages, both the mobile node’s (MN) Home Address (HoA) and Care of Address (CoA) are transmitted as plain-text, hence they can be revealed by network entities and attackers.
Article
The integration of mobile IPv6 heterogeneous networks enhances networking performance; however, it also breaks mobile node's anonymity and location privacy. In this paper, we propose an anonymous and location privacy preserving (ALPP) scheme that consists of two complementary subschemes: anonymous home binding update and anonymous return routability. In addition, anonymous mutual authentication and key establishment schemes have been proposed to work in conjunction with ALPP to authenticate a mobile node to its foreign gateway and create a shared key between them. ALPP adds anonymity and location privacy services to mobile IPv6 signaling to achieve mobile senders and receivers' privacy. Unlike existing schemes, ALPP alleviates the trade-off between the networking performance and the achieved privacy level. Combining onion routing and anonymizer in ALPP scheme increases the achieved location privacy level where no entity in the network except the mobile node itself can identify this node's location. Using entropy model, we show that ALPP achieves higher degree of anonymity than the mix-based scheme. The anonymous home binding update and anonymous return routability subschemes require less computation overheads and thwart both internal and external adversaries. Simulation results demonstrate that our schemes have low control packets routing delays and are suitable for the seamless handover. Copyright (c) 2012 John Wiley & Sons, Ltd.
Conference Paper
We are designing a novel architecture to support future internet services which is going to solve fundamental issues such as addressing, mobility, routing scalability challenges, security and control to support trillion of things to connect with internet. In this paper we have presented an efficient hierarchical identification mapping server (IMS) which uses separation mechanism of identification (ID) and location (LOC). IMS introduces huge amount of LOC independent globally unique Flat ID and Bloom Filter (BF) has been introduces the management of Flat IDs during the Lookup process into the IMS. Hence, we can state that hierarchical IMS architecture could be an alternative solution of current internet oriented innovations in a scalable manner. The aim of architecture is the coverage of Internet and sensors oriented smart objects.
Conference Paper
Full-text available
The basic ideas of the Internet architecture were developed 30+ years ago. In these 30 years, we have learnt a lot about networking and packet switching. Is this the way we would design the Internet if we were to start it now? This paper is an attempt to answer this question raised by US National Science Foundation, which has embarked on the design of the next generation Internet called GENI. In this paper, we point out key problems with the current Internet architecture and propose directions for the solutions. We propose a general architectural framework for the next generation Internet, which we call Internet 3.0. The next generation Internet should be secure. It should allow business to set their boundaries and enforce their policies inside their boundaries. It should allow governments to set rules that protect their citizens on the Internet the same way they protect them on other means of transports. It should allow receivers to set policies for how and where they receive their information. They should have freedom to select their names, IDs and addresses with as little centralized control as possible. The architecture should be general enough to allow different governments to have different rules. Information transport architecture should provide at least as much control and freedom as the goods transport networks provide. We propose the framework of an architecture that supports all these requirements
Article
Full-text available
The Internet has evolved immensely since its inception to being a network of academic and government institutions to its present magnanimous commercial avatar. It is currently deemed to be the single largest resource for information and services. From the times it was managed by central authorities, first by DARPA and then by NSF, the present internet has matured to become a commercially driven, distributed structure with minimal centralized control. The availability of large-scale distributed heterogeneous networks and multiple services makes it important to identify all the computing and non-computing entities and the different services that are a part of it. So when it comes to considering the design for the next generation internet, the naming problem becomes an important issue. In this paper, we try to present a comprehensive, systematic and objective discussion on the naming problem. We present a three-dimensional model of naming to outline some of the major research contributions in this area. The model includes three planes: management plane, transport plane and control plane. We classify all the current naming schemes into these three planes according to the difference in focus of the schemes. A detailed analysis and comparison of these schemes is given according to the three-plane classification model. We try to provide a wholesome discussion on every aspect and dimension of the naming problem and try to make our discussion objective through evaluations, comparisons and evolutionary walkthroughs, wherever relevant. The objective of this study is to gain better understanding of past naming systems to allow designing future naming and addressing schemes for the Next Generation Internet.
Article
Full-text available
We present a performance comparison of a number of key micromobility protocols that have been discussed in the IETF Mobile IP Working Group over the past several years. IP micromobility protocols complement Mobile IP by offering fast and seamless handoff control in limited geographical areas, and IP paging in support of scalability and power conservation. We show that despite the apparent differences between IP micromobility protocols, the operational principles that govern them are largely similar. We use this observation to establish a generic micromobility model to better understand design and performance trade offs. A number of key design choices are identified within the context of the generic model related to handoff quality and route control messaging. We present simulation results for Cellular IP, Hawaii, and Hierarchical Mobile IP, and evaluate the handoff performance of these protocols. Simulation results presented in this article are based on the Columbia IP Micromobility Software (CIMS), which is freely available from the Web (comet.columbia. edu/micromobility) for experimentation.
Conference Paper
The basic ideas of the Internet architecture were developed 30+ years ago. In these 30 years, we have learnt a lot about networking and packet switching. Is this the way we would design the Internet if we were to start it now? This paper is an attempt to answer this question raised by US National Science Foundation, which has embarked on the design of the next generation Internet called GENI. In this paper, we point out key problems with the current Internet architecture and propose directions for the solutions. We propose a general architectural framework for the next generation Internet, which we call Internet 3.0. The next generation Internet should be secure. It should allow business to set their boundaries and enforce their policies inside their boundaries. It should allow governments to set rules that protect their citizens on the Internet the same way they protect them on other means of transports. It should allow receivers to set policies for how and where they receive their information. They should have freedom to select their names, IDs and addresses with as little centralized control as possible. The architecture should be general enough to allow different governments to have different rules. Information transport architecture should provide at least as much control and freedom as the goods transport networks provide. We propose the framework of an architecture that supports all these requirements
Next Generation Wireless Networks: key issues and survey
  • C So-In
  • R Jain
  • J Pan
  • S Paul
C. So-In, R. Jain, J. Pan, and S. Paul, "Next Generation Wireless Networks: key issues and survey," Submitted to EUSASIP Journal on Wireless Communicaiton and Networking, Oct. 2009.
Internet-Draft, draft-ietf-monami6-multiplecoa-14.txt
  • R Wakikawa
  • V Devarapalli
  • G Tsirtsis
  • T Ernst
  • K Nagami
R. Wakikawa, V. Devarapalli, G. Tsirtsis, T. Ernst, and K. Nagami, "Multiple Care-of Addresses Registration," Internet-Draft, draft-ietf-monami6-multiplecoa-14.txt, May 2009.