331 research outputs found

    On the Use of SCTP in Wireless Networks

    Get PDF

    Experimental Tests on SCTP over IPSec

    Get PDF
    As telecommunication technologies evolve, security in communications becomes a more and more relevant issue. IPSec is a set of protocols aiming to enhance security at the IP layer. Specifically, IPSec and IKE are important security mechanism that provide cryptographic-based protection for IP packets, and consequently for IP services. SCTP is a standardized transport protocol whose main features include multihoming and multistreaming, and is gaining momentum as a general-purpose transport protocol. While the simultaneous use of these two protocols is feasible, it is under study how to make them work efficiently. In this paper, we present a simple method to improve SCTP-IPSec-IKE compatibility by modifying the structure of the Security Associations. Despite the conceptual simplicity of our proposal, it has not been proposed before in related literature.This research has been supported by project grant TEC2007-67966-01/TCM (CON-PARTE-1) and it is also developed in the framework of "Programa de Ayudas a Grupos de Excelencia de la RegiĂłn de Murcia, de la FundaciĂłn SĂ©neca, Agencia de Ciencia y TecnologĂ­a de la RM (Plan Regional de Ciencia y TecnologĂ­a 2007/2010)

    Roaming Real-Time Applications - Mobility Services in IPv6 Networks

    Full text link
    Emerging mobility standards within the next generation Internet Protocol, IPv6, promise to continuously operate devices roaming between IP networks. Associated with the paradigm of ubiquitous computing and communication, network technology is on the spot to deliver voice and videoconferencing as a standard internet solution. However, current roaming procedures are too slow, to remain seamless for real-time applications. Multicast mobility still waits for a convincing design. This paper investigates the temporal behaviour of mobile IPv6 with dedicated focus on topological impacts. Extending the hierarchical mobile IPv6 approach we suggest protocol improvements for a continuous handover, which may serve bidirectional multicast communication, as well. Along this line a multicast mobility concept is introduced as a service for clients and sources, as they are of dedicated importance in multipoint conferencing applications. The mechanisms introduced do not rely on assumptions of any specific multicast routing protocol in use.Comment: 15 pages, 5 figure

    Delay-centric handover in SCTP

    Get PDF
    The introduction of the Stream Control Transmission Protocol (SCTP) has opened the possibility of a mobile aware transport protocol. The multihoming feature of SCTP negates the need for a solution such as Mobile IP and, as SCTP is a transport layer protocol, it adds no complexity to the network. Utilizing the handover procedure of SCTP, the large bandwidth of WLAN can be exploited whilst in the coverage of a hotspot, and still retain the 3G connection for when the user roams out of the hotspot’s range. All this functionality is provided at the transport layer and is transparent to the end user, something that is still important in non-mobile-aware legacy applications. However, there is one drawback to this scenario - the current handover scheme implemented in SCTP is failure-centric in nature. Handover is only performed in the presence of primary destination address failure. This dissertation proposes a new scheme for performing handover using SCTP. The handover scheme being proposed employs an aggressive polling of all destination addresses within an individual SCTP association in order to determine the round trip delay to each of these addresses. It then performs handover based on these measured path delays. This delay-centric approach does not incur the penalty associated with the current failover-based scheme, namely a number of timeouts before handover is performed. In some cases the proposed scheme can actually preempt the path failure, and perform handover before it occurs. The proposed scheme has been evaluated through simulation, emulation, and within the context of a wireless environment

    Cross layer Interaction Models for SCTP and OLSR

    Get PDF
    International audienceThe evolution from wired system to the wireless environment opens a set of challenge for the improvement of the wireless system performances because of many of their weakness compared to wired networks. To achieve this goal, cross layer techniques are used to facilitate the sharing of information between the layers of the OSI model. In some precedent works, the Reverse Cross Layer (RCL) method has been proposed to facilitate the design of cross layer conceptual models. The method has the advantage to highlight the impact of each cross layer interaction on each protocol in order to update its source code and to describe the intuitive gains that can be achieve. The method may be applied to a given protocol stack or to an existent cross layer model to integrate new interactions. In this paper, we are applying the RCL method on the stack that uses the Stream Control Transport Protocol (SCTP) at the transport layer and the Optimized Link State Routing (OLSR) at the network layer. Cross layer conceptual models are produced based on new cross layer interactions that are proposed to populate the environment subsystem built with the application of the RCL method. The improvement of the environment subsystem is specified through the performance gains provide by the new interactions. The implementation of the interactions that impact the SCTP protocol is described in the Interaction Description Array. After the introduction, Section II of this paper presents an overview of the SCTP protocol. Section III is related to the overview of the OLSR protocol. Section IV is used for the application of the RCL method and the different interaction arrays it generates. Section V presents the improvement of the environment subsystem and the definition of the performance gain of each Cross Layer Atomic Action (CLAA)

    Cross-Layer Extended Persistent Timeout Policy for SCTP and DSDV

    Get PDF
    International audienceCross layer techniques applied to various protocols stacks provide fair information sharing between OSI model layers. The performance gains have been demonstrated for many studied systems within protocols interactions. The example is illustrative of the reliable transport protocols that use retransmissions to achieve that reliability function. The performance gains of the persistent timeout policy for the management of the retransmission timeout have been produce in some recent works when applying that persistent timeout policy only to reliable transport protocol. The goal was to give an appropriate behavior in response to a bad state of the wireless channel that occurs and temporally blocks the transmission of data. The channel state is given by the 802.11 link layer through cross-layer mechanism. In this paper, the persistent policy is extended to the network layer and is applied to a stack that uses a reactive routing protocol, namely the Destination Sequenced Distance-Vector (DSDV) protocol that also generates additional periodic traffic regardless to the channel state. We are measuring the influence in terms of performance gains of the extended persistent policy because of the additional periodic signalization messages deriving from the used routing protocol. After the introduction in section I; Section II of this paper presents an overview of the Stream Control Transmission Protocol (SCTP). Section III describes the behavior of the DSDV protocol. Section IV presents the extended persistent timeout policy principle and Section V presents the simulation results used to compare the using of the traditional and the extended persistent timeout policies applied to the same protocol stack using SCTP and DSDV

    Secure Real-time Data Transmission for Drone Delivery Services using Forward Prediction Scheduling SCTP

    Get PDF
    Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  However, because the data transmission process occurs in a wireless network, data will be sent over a channel that is more unstable and vulnerable to attack. Thus, this research, purposes a  Forward Prediction Scheduling-based Stream Control Transmission Protocol (FPS-SCTP) scheme that is implemented on drone data transmission system. This scheme supports piggybacking, multi-streaming, and Late Messages Filter (LMF) which will improve the real-time transmission process in IEEE 802.11 wireless network. Meanwhile, on the cybersecurity aspect, this scheme provides the embedded option feature to enable the encryption mechanism using AES and the digital signatures mechanism using ECDSA. The results show that the FPS-SCTP scheme has better network performance than the default SCTP, and provides full security services with low computation time. This research contributes to providing a communication protocol scheme that is suitable for use on the internet of drones’ environment, both in real-time and reliable security levels
    • 

    corecore