EFH: An Edge-Based Fast Handover for Mobile IPv6 in IEEE 802.11b WLAN

Author(s):  
Sangdong Jang ◽  
Wu Woan Kim
Author(s):  
Jani Puttonen ◽  
Ari Viinikainen ◽  
Miska Sulander ◽  
Timo Hamalainen

Mobile IPv6 (MIPv6) has been standardized for mobility management in the IPv6 network. When a mobile node changes its point of attachment in the IPv6 network, it experiences a time due MIPv6 procedures when it cannot receive or send any packets. This time called the handover delay might also cause packet loss resulting undesired quality-of-service degradation for various types of applications. The minimization of this delay is especially important for real-time applications. In this chapter we present a fast handover method called the flow-based fast handover for Mobile IPv6 (FFHMIPv6) to speed up the MIPv6 handover processes. FFHMIPv6 employs flow information and IPv6-in-IPv6 tunneling for the fast redirection of the flows during the MIPv6 handover. Also, FFHMIPv6 employs a temporary hand-off-address to minimize the upstream connectivity. We present the performance results comparing the FFHMIPv6 method to other fundamental handover methods with Network Simulator 2 (ns-2) and Mobile IPv6 for Linux (MIPL) network.


PLoS ONE ◽  
2017 ◽  
Vol 12 (10) ◽  
pp. e0182375 ◽  
Author(s):  
Byungseok Kang ◽  
Khuong Quoc Anh ◽  
Hyunseung Choo

2015 ◽  
Vol 2015 ◽  
pp. 1-11
Author(s):  
Chang-Seop Park ◽  
Hyun-Sun Kang ◽  
Jaijin Jung

A new key management and security scheme is proposed to integrate Layer Two (L2) and Layer Three (L3) keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN). Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6) that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP) authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.


Sign in / Sign up

Export Citation Format

Share Document