83 research outputs found

    Mobility management across converged IP-based heterogeneous access networks

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 8/2/2010.In order to satisfy customer demand for a high performance “global” mobility service, network operators (ISPs, carriers, mobile operators, etc.) are facing the need to evolve to a converged “all-IP” centric heterogeneous access infrastructure. However, the integration of such heterogeneous access networks (e.g. 802.11, 802.16e, UMTS etc) brings major mobility issues. This thesis tackles issues plaguing existing mobility management solutions in converged IP-based heterogeneous networks. In order to do so, the thesis firstly proposes a cross-layer mechanism using the upcoming IEEE802.21 MIH services to make intelligent and optimized handovers. In this respect, FMIPv6 is integrated with the IEEE802.21 mechanism to provide seamless mobility during the overall handover process. The proposed solution is then applied in a simulated vehicular environment to optimize the NEMO handover process. It is shown through analysis and simulations of the signalling process that the overall expected handover (both L2 and L3) latency in FMIPv6 can be reduced by the proposed mechanism by 69%. Secondly, it is expected that the operator of a Next Generation Network will provide mobility as a service that will generate significant revenues. As a result, dynamic service bootstrapping and authorization mechanisms must be in place to efficiently deploy a mobility service (without static provisioning), which will allow only legitimate users to access the service. A GNU Linux based test-bed has been implemented to demonstrate this. The experiments presented show the handover performance of the secured FMIPv6 over the implemented test-bed compared to plain FMIPv6 and MIPv6 by providing quantitative measurements and results on the quality of experience perceived by the users of IPv6 multimedia applications. The results show the inclusion of the additional signalling of the proposed architecture for the purpose of authorization and bootstrapping (i.e. key distribution using HOKEY) has no adverse effect on the overall handover process. Also, using a formal security analysis tool, it is shown that the proposed mechanism is safe/secure from the induced security threats. Lastly, a novel IEEE802.21 assisted EAP based re-authentication scheme over a service authorization and bootstrapping framework is presented. AAA based authentication mechanisms like EAP incur signalling overheads due to large RTTs. As a result, overall handover latency also increases. Therefore, a fast re-authentication scheme is presented which utilizes IEEE802.21 MIH services to minimize the EAP authentication process delays and as a result reduce the overall handover latency. Analysis of the signalling process based on analytical results shows that the overall handover latency for mobility protocols will be approximately reduced by 70% by the proposed scheme

    Securing Handover in Wireless IP Networks

    Get PDF
    In wireless and mobile networks, handover is a complex process that involves multiple layers of protocol and security executions. With the growing popularity of real time communication services such as Voice of IP, a great challenge faced by handover nowadays comes from the impact of security implementations that can cause performance degradation especially for mobile devices with limited resources. Given the existing networks with heterogeneous wireless access technologies, one essential research question that needs be addressed is how to achieve a balance between security and performance during the handover. The variations of security policy and agreement among different services and network vendors make the topic challenging even more, due to the involvement of commercial and social factors. In order to understand the problems and challenges in this field, we study the properties of handover as well as state of the art security schemes to assist handover in wireless IP networks. Based on our analysis, we define a two-phase model to identify the key procedures of handover security in wireless and mobile networks. Through the model we analyze the performance impact from existing security schemes in terms of handover completion time, throughput, and Quality of Services (QoS). As our endeavor of seeking a balance between handover security and performance, we propose the local administrative domain as a security enhanced localized domain to promote the handover performance. To evaluate the performance improvement in local administrative domain, we implement the security protocols adopted by our proposal in the ns-2 simulation environment and analyze the measurement results based on our simulation test

    Project Final Report – FREEDOM ICT-248891

    Get PDF
    This document is the final publishable summary report of the objective and work carried out within the European Project FREEDOM, ICT-248891.This document is the final publishable summary report of the objective and work carried out within the European Project FREEDOM, ICT-248891.Preprin

    Ubiquity of Client Access in Heterogeneous Access Environment, Journal of Telecommunications and Information Technology, 2014, nr 3

    Get PDF
    With popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to personal computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Everything as a Service) approach. In this situation and combined with the fact that most Internet-based services are able to function efficiently even in best effort environment, requirement of ubiquity of network access becomes one of the most important elements of today’s computing environment. This paper presents a general overview of the the vast group of mechanisms and technologies utilized in modern attempts to efficiently provide ubiquity on network access in heterogeneous environment of today’s access systems. It starts with division of users interested in ubiquitous network access into broad groups of common interest, complete with their basic requirements and access characteristics, followed by a survey of both already popular and new wireless technologies suitable to provide such access. Then a general discussion of most important challenges which must be addressed while attempting to fulfill the above goal is provided, addressing topics such as handover control and mobility management

    Contributions to Vehicular Communications Systems and Schemes

    Get PDF
    La dernière décennie a marqué une grande hausse des applications véhiculaires comme une nouvelle source de revenus et un facteur de distinction dans l'industrie des véhicules. Ces applications véhiculaires sont classées en deux groupes : les applications de sécurité et les applications d'info divertissement. Le premier groupe inclue le changement intelligent de voie, l'avertissement de dangers de routes et la prévention coopérative de collision qui comprend la vidéo sur demande (VoD), la diffusion en direct, la diffusion de météo et de nouvelles et les jeux interactifs. Cependant, Il est à noter que d'une part, les applications véhiculaires d'info divertissement nécessitent une bande passante élevée et une latence relativement faible ; D'autre part, les applications de sécurité requièrent exigent un délai de bout en bout très bas et un canal de communication fiable pour la livraison des messages d'urgence. Pour satisfaire le besoin en applications efficaces, les fabricants de véhicules ainsi que la communauté académique ont introduit plusieurs applications à l’intérieur de véhicule et entre véhicule et véhicule (V2V). Sauf que, l'infrastructure du réseau sans fil n'a pas été conçue pour gérer les applications de véhicules, en raison de la haute mobilité des véhicules, de l'imprévisibilité du comportement des conducteurs et des modèles de trafic dynamiques. La relève est l'un des principaux défis des réseaux de véhicules, car la haute mobilité exige au réseau sans fil de faire la relève en un très court temps. De plus, l'imprévisibilité du comportement du conducteur cause l'échec des protocoles proactifs traditionnels de relève, car la prédiction du prochain routeur peut changer en fonction de la décision du conducteur. Aussi, le réseau de véhicules peut subir une mauvaise qualité de service dans les régions de relève en raison d'obstacles naturels, de véhicules de grande taille ou de mauvaises conditions météorologiques. Cette thèse se concentre sur la relève dans l'environnement des véhicules et son effet sur les applications véhiculaires. Nous proposons des solutions pratiques pour les réseaux actuellement déployés, principalement les réseaux LTE, l'infrastructure véhicule à véhicule (V2V) ainsi que les outils efficaces d’émulateurs de relèves dans les réseaux véhiculaires.----------ABSTRACT: The last decade marked the rise of vehicular applications as a new source of revenue and a key differentiator in the vehicular industry. Vehicular Applications are classified into safety and infotainment applications. The former include smart lane change, road hazard warning, and cooperative collision avoidance; however, the latter include Video on Demand (VoD), live streaming, weather and news broadcast, and interactive games. On one hand, infotainment vehicular applications require high bandwidth and relatively low latency; on the other hand, safety applications requires a very low end to end delay and a reliable communication channel to deliver emergency messages. To satisfy the thirst for practical applications, vehicle manufacturers along with research institutes introduced several in-vehicle and Vehicle to Vehicle (V2V) applications. However, the wireless network infrastructure was not designed to handle vehicular applications, due to the high mobility of vehicles, unpredictability of drivers’ behavior, and dynamic traffic patterns. Handoff is one of the main challenges of vehicular networks since the high mobility puts pressure on the wireless network to finish the handoff within a short period. Moreover, the unpredictability of driver behavior causes the traditional proactive handoff protocols to fail, since the prediction of the next router may change based on the driver’s decision. Moreover, the vehicular network may suffer from bad Quality of Service (QoS) in the regions of handoff due to natural obstacles, large vehicles, or weather conditions. This thesis focuses on the handoff on the vehicular environment and its effect on the vehicular applications. We consider practical solutions for the currently deployed networks mainly Long Term Evolution (LTE) networks, the Vehicle to Vehicle (V2V) infrastructure, and the tools that can be used effectively to emulate handoff on the vehicular networks

    Distributed mobility management for a flat architecture in 5G mobile networks: solutions, analysis and experimental validation

    Get PDF
    In the last years, the commercial deployment of data services in mobile networks has been evolving quickly, providing enhanced radio access technologies and more efficient network architectures. Nowadays, mobile users enjoy broadband and ubiquitous wireless access through their portable devices, like smartphones and tablets, exploiting the connectivity offered by the modern 4G network. Nevertheless, the technological evolution keeps moving towards the development of next generation networks, or 5G, aiming at further improving the current system in order to cope with the huge data traffic growth foreseen in the future years. One of the possible research guidelines aims at innovating the mobile networks architecture by designing a flat system. Indeed, current systems are built upon a centralized and hierarchical structure, where multiple access networks are connected to a central core hosting crucial network functions, e.g., charging, control and maintenance, as well as mobility management, which is the main topic of this thesis. In such a central mobility management system, users’ traffic is aggregated at some key nodes in the core, called mobility anchors. Thus, an anchor can easily handle user’s mobility by redirecting traffic flows to his/her location, but i) it poses scalability issues, ii) it represents a single point of failure, and iii) the routing path is in general suboptimal. These problems can be overcome moving to a flat architecture, adopting a Distributed Mobility Management (DMM) system, where the centralized anchor is removed. This thesis develops within the DMM framework, presenting the design, analysis, implementation and experimental validation of several DMM protocols. In this work we describe original protocols for client-based and network-based mobility management, as well as a hybrid solution. We study analytically our solutions to evaluate their signaling cost, the packet delivery cost, and the latency introduced to handle a handover event. Finally, we assess the validity of some of our protocols with experiments run over a network prototype built in our lab implementing such solutions.El despliegue comercial de los servicios de datos en las redes móviles ha evolucionado rápidamente en los últimos años, proporcionando tecnologías de acceso radio más avanzadas y arquitecturas de red más eficientes. Los usuarios ya pueden disfrutar de los servicios de banda ancha desde sus dispositivos móviles, como smartphones y tablets, aprovechando la conectividad de las modernas redes 4G. Sin embargo, la evolución tecnológica sigue trazando su camino hasta el desarrollo de las redes de próxima generación, o 5G, en previsión del enorme aumento del tráfico de los años futuros. Una de las innovaciones bajo estudio aborda la arquitectura de las redes móviles, con el objetivo de diseñar un sistema plano. Efectivamente, el sistema actual se basa en una estructura centralizada y jerárquica, en la cual múltiples redes de acceso se conectan al núcleo central, dónde residen funciones cruciales para el control de la red y facturación, así como la gestión de la movilidad, que es el tema central de esta tesis. En un sistema con gestión centralizada de la movilidad, se agregan los flujos de tráfico en algunos nodos claves situados en el núcleo de la red, llamados anclas de movilidad. De este modo, un ancla puede fácilmente redirigir los flujos al lugar donde se halla el usuario, pero i) supone problemas de escalabilidad, ii) representa un punto único de fallo, y iii) el encaminamiento es en general sub-óptimo. Estos problemas se pueden resolver pasando a una arquitectura plana, cambiándose a un sistema de gestión distribuida de la movilidad (Distributed Mobility Management – DMM), donde no hay anclas centralizadas. Esta tesis se desarrolla dentro el marco propuesto por DMM, presentando el diseño, el análisis, la implementación y la validación experimental de varios protocolos de movilidad distribuida. Se describen soluciones basadas en el cliente y en la red, así como una solución híbrida. El funcionamiento de las soluciones ha sido estudiado analíticamente, para evaluar los costes de señalización, el coste del transporte de los paquetes y la latencia para gestionar el traspaso de los usuarios de una red a otra. Finalmente, la validez de los protocolos ha sido demostrada con experimentos sobre un prototipo donde se implementan algunas de las soluciones utilizando el equipamiento de nuestro laboratorio.Programa Oficial de Doctorado en Ingeniería TelemáticaPresidente: Arturo Azcorra Saloña.- Secretario: Ramón Agüero Calvo.- Vocal: Jouni Korhone

    Context awareness and related challenges: A comprehensive evaluation study for a context-based RAT selection scheme towards 5G networks

    Get PDF
    Ο αποτελεσματικός σχεδιασμός των δικτύων είναι απαραίτητος για να αντιμετωπιστεί ο αυξανόμενος αριθμός των συνδρομητών κινητού διαδικτύου και των απαιτητικών υπηρεσιών δεδομένων, που ανταγωνίζονται για περιορισμένους ασύρματους πόρους. Επιπλέον, οι βασικές προκλήσεις για τα συνεχώς αναπτυσσόμενα δίκτυα LTE είναι η αύξηση των δυνατοτήτων των υφιστάμενων μηχανισμών, η μείωση της υπερβολικής σηματοδότησης (signaling) και η αξιοποίηση ενός αποτελεσματικού μηχανισμού επιλογής τεχνολογίας ασύρματης πρόσβασης (RAT). Υπάρχουν ποικίλες προτάσεις στην βιβλιογραφία σχετικά με αυτές τις προκλήσεις, μερικές από τις οποίες παρουσιάζονται εδώ. Ο σκοπός της εργασίας αυτής είναι να ερευνήσει τις τρέχουσες εξελίξεις στα δίκτυα LTE σχετικά με την ενσωμάτωση EPC και WiFi και την επίγνωση πλαισίου (context awareness) στην διαχείριση κινητικότητας, και να προτείνει τον αλγόριθμο COmpAsS, έναν μηχανισμό που χρησιμοποιεί ασαφή λογική (fuzzy logic) για να επιλέξει την πιο κατάλληλη τεχνολογία ασύρματης πρόσβασης για τα κινητά. Επιπλέον, έχουμε ποσοτικοποιήσει το κόστος σηματοδότησης του προτεινόμενου μηχανισμού σε σύνδεση με τις σημερινές προδιαγραφές του 3GPP και εκτελέσαμε μια ολοκληρωμένη ανάλυση. Τέλος, αξιολογήσαμε τον αλγόριθμο μέσω εκτεταμένων προσομοιώσεων σε ένα πολύπλοκο και ρεαλιστικό σενάριο χρήσης 5G, που απεικονίζονται τα σαφή πλεονεκτήματα της προσέγγισής μας όσον αφορά τη συχνότητα μεταπομπών (handover) και τις μετρήσεις βασικών QoS τιμών, όπως ρυθμός μετάδοσης και καθυστέρηση.Effective network planning is essential to cope with the increasing number of mobile internet subscribers and bandwidth-intensive services competing for limited wireless resources. Additionally, key challenges for the constantly growing LTE networks is increasing capabilities of current mechanisms, reduction of signaling overhead and the utilization of an effective Radio Access Technology (RAT) selection scheme. There have been various proposals in literature regarding these challenges, some of which are discussed here. The purpose of this work is to research the current advances in LTE networks regarding EPC - WiFi integration and context awareness in mobility management, and propose the COmpAsS algorithm, a mechanism using fuzzy logic to select the most suitable Radio Access Technology. Furthermore, we quantify the signaling overhead of the proposed mechanism by linking it to the current 3GPP specifications and performing a comprehensive analysis. Finally, we evaluate the novel scheme via extensive simulations in a complex and realistic 5G use case, illustrating the clear advantages of our approach in terms of handover frequency and key QoS metrics, i.e. the user-experienced throughput and delay

    Mobility management across converged IP-based heterogeneous access networks

    Get PDF
    In order to satisfy customer demand for a high performance “global” mobility service, network operators (ISPs, carriers, mobile operators, etc.) are facing the need to evolve to a converged “all-IP” centric heterogeneous access infrastructure. However, the integration of such heterogeneous access networks (e.g. 802.11, 802.16e, UMTS etc) brings major mobility issues. This thesis tackles issues plaguing existing mobility management solutions in converged IP-based heterogeneous networks. In order to do so, the thesis firstly proposes a cross-layer mechanism using the upcoming IEEE802.21 MIH services to make intelligent and optimized handovers. In this respect, FMIPv6 is integrated with the IEEE802.21 mechanism to provide seamless mobility during the overall handover process. The proposed solution is then applied in a simulated vehicular environment to optimize the NEMO handover process. It is shown through analysis and simulations of the signalling process that the overall expected handover (both L2 and L3) latency in FMIPv6 can be reduced by the proposed mechanism by 69%. Secondly, it is expected that the operator of a Next Generation Network will provide mobility as a service that will generate significant revenues. As a result, dynamic service bootstrapping and authorization mechanisms must be in place to efficiently deploy a mobility service (without static provisioning), which will allow only legitimate users to access the service. A GNU Linux based test-bed has been implemented to demonstrate this. The experiments presented show the handover performance of the secured FMIPv6 over the implemented test-bed compared to plain FMIPv6 and MIPv6 by providing quantitative measurements and results on the quality of experience perceived by the users of IPv6 multimedia applications. The results show the inclusion of the additional signalling of the proposed architecture for the purpose of authorization and bootstrapping (i.e. key distribution using HOKEY) has no adverse effect on the overall handover process. Also, using a formal security analysis tool, it is shown that the proposed mechanism is safe/secure from the induced security threats. Lastly, a novel IEEE802.21 assisted EAP based re-authentication scheme over a service authorization and bootstrapping framework is presented. AAA based authentication mechanisms like EAP incur signalling overheads due to large RTTs. As a result, overall handover latency also increases. Therefore, a fast re-authentication scheme is presented which utilizes IEEE802.21 MIH services to minimize the EAP authentication process delays and as a result reduce the overall handover latency. Analysis of the signalling process based on analytical results shows that the overall handover latency for mobility protocols will be approximately reduced by 70% by the proposed scheme.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
    corecore