Secure route optimization for Mobile Network Node using secure address proxying

Author(s):  
Manhee Jo ◽  
Hiroshi Inamura
Author(s):  
Sulata Mitra

This chapter develops the concept of route optimization in a multi-homed mobile network. In a future wireless network a user may have multiple mobile devices, each having multiple network interfaces and needing interconnection with each other as well as with other networks to form a mobile network. Such mobile networks may be multi-homed i.e. having multiple points of attachment to the Internet. It forwards packets of mobile network nodes inside it to Internet using suitable routes. But there may be multiple routes in a mobile network for forwarding packets of mobile network node. Moreover, the mobile network nodes inside a mobile network may have packets of different service types. So the optimal route selection inside a mobile network depending upon the service type of mobile network node is an important research issue. Two different route optimization schemes to create point to point network among mobile network nodes are elaborated in this chapter. This chapter is aimed at the researchers and the policy makers making them aware of the different means of efficient route selection in a multi-homed mobile network as well as understanding the problem areas that need further vigorous research.


Author(s):  
Shayma Senan ◽  
AishaHassan A. Hashim ◽  
Rashid A. Saeed ◽  
Shihab A. Hameed ◽  
Akram M. Zeki ◽  
...  

Author(s):  
Volodymyr Smirnov ◽  
◽  
Natalia Smirnova ◽  

The purpose of the article is to develop an adaptive mobile network node architecture with an amorphous topology. The article describes the host controller architecture. The concept of a mobile network is described. The mobile network is adaptive, self-organizing, and able to operate autonomously. The presented mobile network node controller architecture is the object swarm control system basis. A stack of mobile network protocols is presented, consisting of a control protocol, a data exchange protocol and a configuration protocol. The nodes of the network controllers interaction is carried out using several transceivers. The use of multiple transceivers made it possible to distribute data traffic, configuration traffic, and management traffic over different channels, which made it possible to carry out information exchange at the same time. The protocol stack is minimized. The functionality of the host and the network object (swarm) is completely separated. The topology of the mobile network is not deterministic, amorphous and changes when the network objects move in space. In this case, some connections are lost and others arise. The routing tables are constantly updated. The network in accordance with the laid down algorithm, is able to build the necessary topology and organize the necessary connections in order to complete the task with a swarm of objects. The network is capable of building packet retransmission chains for remote network objects. Thus, the implementation of a mobile network at its low cost allows solving a certain range of problems. The performer can be either a separate object associated with the operator through a swarm of repeaters, or a swarm of objects. In order to increase the efficiency of the formation of routing tables and minimize the cluster structures in a mobile network, it is advisable to use optimization algorithms based on set theory. The mobile network is designed to control a swarm of objects, which can be UAVs, robotic objects and control systems for various technological processes.


Author(s):  
Shayma Senan ◽  
AishaHassan A. Hashim ◽  
Akram M. Zeki ◽  
Rashid A. Saeed ◽  
Shihab A. Hameed ◽  
...  

2007 ◽  
Vol 43 (3) ◽  
pp. 975-995 ◽  
Author(s):  
Moon Sang Jeong ◽  
Yeong Hun Cho ◽  
Jong Tae Park

Sign in / Sign up

Export Citation Format

Share Document