scholarly journals Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

2015 ◽  
Vol 2015 ◽  
pp. 1-14
Author(s):  
Ananthi Jebaseeli Samuelraj ◽  
Sundararajan Jayapal

Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node’s mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node’s mobility should be modified to support group nodes’ mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

2012 ◽  
pp. 151-180
Author(s):  
Arijit Ukil

Network mobility (NEMO) management is concerned about the mobility management of an entire wireless mobile network to provide uninterrupted network connectivity to many mobile devices moving together in the mobile network. This is particularly important for ubiquitous computing, which commonly means anytime, anywhere computing and communication. Most of the 3G and entire 4G and beyond wireless communication technology is all-IP. This growing use of IP devices in portable applications has created the demand for mobility support for entire networks of IP devices. NEMO solves this problem by extending Mobile IP. Devices on a mobile network are unaware of their network’s mobility; however, they are provided with uninterrupted Internet access even when the network changes its attachment point to the Internet. The main objective of NEMO is to provide continuous, optimal, and secure Internet access to all nodes and even recursively nested mobile sub-nets inside a moving network. Internet Engineering Task Force (IETF) is engaged in standardizing NEMO Basic Support protocol that ensures uninterrupted connectivity to nodes within a mobile network via a mobile router. This protocol extends the mechanisms utilized in the host mobility management protocol Mobile IPv6. There are few open problems remain to be addressed in NEMO. In this chapter, we discuss about NEMO basic support protocols, its features, and other related issues.


Author(s):  
Arijit Ukil

Network mobility (NEMO) management is concerned about the mobility management of an entire wireless mobile network to provide uninterrupted network connectivity to many mobile devices moving together in the mobile network. This is particularly important for ubiquitous computing, which commonly means anytime, anywhere computing and communication. Most of the 3G and entire 4G and beyond wireless communication technology is all-IP. This growing use of IP devices in portable applications has created the demand for mobility support for entire networks of IP devices. NEMO solves this problem by extending Mobile IP. Devices on a mobile network are unaware of their network’s mobility; however, they are provided with uninterrupted Internet access even when the network changes its attachment point to the Internet. The main objective of NEMO is to provide continuous, optimal, and secure Internet access to all nodes and even recursively nested mobile sub-nets inside a moving network. Internet Engineering Task Force (IETF) is engaged in standardizing NEMO Basic Support protocol that ensures uninterrupted connectivity to nodes within a mobile network via a mobile router. This protocol extends the mechanisms utilized in the host mobility management protocol Mobile IPv6. There are few open problems remain to be addressed in NEMO. In this chapter, we discuss about NEMO basic support protocols, its features, and other related issues.


Author(s):  
Isac Gnanaraj J ◽  
Sriram .

One of emerging trends in the mobile network era is Network Mobility (NEMO). It was standardized by the Internet Engineering Task Force (IETF) and gained attention of the researchers because of research opportunities that it provides. Though it was developed based on MIPv6, there are few spots that must be analyzed and rectified, especially in the security aspects. According to the literatures, NEMO lacks in providing a robust Authentication, Authorization and Accounting (AAA) services to its users. AAA operations must be performed for all the players of the mobile network, because a hacker may reside at any place and try to access the mobile network by hiding behind valid or genuine nodes’ addresses. This research work aims to provide an AAA framework for NEMO by comprising three different mechanisms which are developed for Local Mobile Node (LMN), Visiting Mobile Node (VMN) and Mobile Router (MR). Simulation and performance analysis are done.


Author(s):  
Nerea Toledo ◽  
Marivi Higuero

The proposals suggested so far can be can be classified in two different categories: on the one hand, NEMO solutions that consider MIPv6 as the base host mobility management protocol, and on the other hand, solutions that consider alternative base host mobility management protocols like SIP, LIN6, or HIP. Besides, a taxonomy on MIPv6 based NEMO protocols classifying them by considering which characteristics they aim to enhance is provided. It is important to point out that the selection of the base host mobility management protocol is fundamental to have as many demanded key features satisfied as possible by the NEMO protocol to be applied in the Intelligent Transportation System (ITS) context.


Author(s):  
Adnan J. Jabir

<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency. The bulk binding approaches were used to enhance the mobility signaling for MNs which are moving together from one MAG to another by exchanging a single bulk binding update message. However, in some cases there might be several MNs move at the same time but among different MAGs. In this paper, a bulk registration scheme based on the clustered sensor PMIPv6 architecture is proposed to reduce the mobility signaling cost by creating a single bulk message for all MNs attached to the cluster. Our mathematical results show that the proposed bulk scheme enhances the PMIPv6 performance by reducing the total handoff latency.</p>


2015 ◽  
Vol 72 (5) ◽  
Author(s):  
Mojtaba Alizadeh ◽  
Mazdak Zamani ◽  
Sabariah Baharun ◽  
Wan Haslina Hassan ◽  
Touraj Khodadadi

Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this protocol, all mobility signaling procedures are completed by network entity not mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure has a key role to protect the network against different security threats; however, the details of authentication procedure is not specified in this standard. In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. The existing authentication approaches can be analyzed based on these criteria to find security issues.


Sign in / Sign up

Export Citation Format

Share Document