1,868 research outputs found
IPv6 Network Mobility
Network Authentication, Authorization, and Accounting has
been used since before the days of the Internet as we know it
today. Authentication asks the question, “Who or what are
you?” Authorization asks, “What are you allowed to do?” And fi nally,
accounting wants to know, “What did you do?” These fundamental
security building blocks are being used in expanded ways today. The
fi rst part of this two-part series focused on the overall concepts of
AAA, the elements involved in AAA communications, and highlevel
approaches to achieving specifi c AAA goals. It was published in
IPJ Volume 10, No. 1[0]. This second part of the series discusses the
protocols involved, specifi c applications of AAA, and considerations
for the future of AAA
Design and Experimental Evaluation of a Route Optimisation Solution for NEMO
An important requirement for Internet protocol (IP)
networks to achieve the aim of ubiquitous connectivity is network
mobility (NEMO). With NEMO support we can provide Internet
access from mobile platforms, such as public transportation vehicles,
to normal nodes that do not need to implement any special
mobility protocol. The NEMO basic support protocol has been
proposed in the IETF as a first solution to this problem, but this
solution has severe performance limitations. This paper presents
MIRON: Mobile IPv6 route optimization for NEMO, an approach
to the problem of NEMO support that overcomes the limitations
of the basic solution by combining two different modes of operation:
a Proxy-MR and an address delegation with built-in routing
mechanisms. This paper describes the design and rationale of the
solution, with an experimental validation and performance evaluation
based on an implementation.Publicad
Mobility Management, Quality of Service, and Security in the Design of Next Generation Wireless Network
The next generation wireless network needs to provide seamless roaming among various access technologies in a heterogeneous environment. In allowing users to access any system at anytime and anywhere, the performance of mobility-enabled protocols is important. While Mobile IPv6 is generally used to support macro-mobility, integrating Mobile IPv6 with Session Initiation Protocol (SIP) to support IP traffic will lead to improved mobility performance. Advanced resource management techniques will ensure Quality of Service (QoS) during real-time mobility within the Next Generation Network (NGN) platform. The techniques may use a QoS Manager to allow end-to-end coordination and adaptation of Quality of Service. The function of the QoS Manager also includes dynamic allocation of resources during handover. Heterogeneous networks raise many challenges in security. A security entity can be configured within the QoS Manager to allow authentication and to maintain trust relationships in order to minimize threats during system handover. The next generation network needs to meet the above requirements of mobility, QoS, and security
Responsibility and non-repudiation in resource-constrained Internet of Things scenarios
The proliferation and popularity of smart
autonomous systems necessitates the development
of methods and models for ensuring the effective
identification of their owners and controllers. The aim
of this paper is to critically discuss the responsibility of
Things and their impact on human affairs. This starts
with an in-depth analysis of IoT Characteristics such
as Autonomy, Ubiquity and Pervasiveness. We argue
that Things governed by a controller should have an
identifiable relationship between the two parties and
that authentication and non-repudiation are essential
characteristics in all IoT scenarios which require
trustworthy communications. However, resources can
be a problem, for instance, many Things are designed
to perform in low-powered hardware. Hence, we also
propose a protocol to demonstrate how we can achieve the
authenticity of participating Things in a connectionless
and resource-constrained environment
- …