scholarly journals Research on Mobility Management Based on MIP Table in Mixed IPv4/v6 Networks

2013 ◽  
Vol 347-350 ◽  
pp. 2038-2042
Author(s):  
Zheng Xiang ◽  
Zheng Ming Ma

IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a scheme to solve one of Mobile IPv4/v6 problems which Home Agent (HA) locates in IPv6 network, and Correspondent Node (CN) locates in IPv4 network, while Mobile Node (MN) moves within IPv4 network. In the solution, a gateway called Mobile IPv4/v6 translation gateway (MIPv4/v6-TG) is introduced to bridge between IPv4 network and IPv6 network, which is made up of a traditional NAT-PT gateway and a Mobile IP application level gateway (MIP-ALG) built upon the NAT-PT gateway. MIP-ALG maintains a MIP table, a data structure, which is formed by entries. We use the MIP table to realize the communication between the IPv4 entities and the IPv6 entities. The creation, usage and update processes of MIP table are described in this paper. And it can work compatibly with RFC3344 and RFC3775.

EXPLORE ◽  
2019 ◽  
Vol 9 (2) ◽  
Author(s):  
Muhammad Multazam

Mobile IP merupakan protocol yang mendukung mobilitas dari user, dengan mobile IP sebuah node dapat terus berkomunikasi dengan node yang lain dimanapun dia berada. Mobile IPv6 memperbolehkan node yang telah mempunyai dukungan terhadap IPv6 untuk meninggalkan jaringan asalnya sementara node tersebut sedang memperbarui koneksinya ke internet. Hal ini berarti bahwa mobile IPv6 bisa mengidentifikasi tiap-tiap node dengan static address-nya, tanpa memperhatikan point of attachment nya ke internet.Mobile IPv6 yang digunakan pada makalah ini memakai metode triangle tunneling yaitu metode perutean pengiriman paket dimana ketika correspondent node (CN) mengirimkan paket menuju mobile node (MN), home agent (HA) mengambil alih paket tersebut dan mengirimkannya ke care of address dari MN dengan tunneling, sedangkan MN dapat mengirimkan langsung menuju CN. Pada makalah ini dilakukan pengujian video conference (multipont) pada jaringan Mobile IPv6 dengan metode triangle tunneling untuk diukur parameter-parameter QoS meliputi packet loss, delay, jitter, throughput dan MOS.Berdasarkan hasil uji coba dengan memperhatikan parameter-parameter QoS yang dianalisa terlihat bahwa kualitas MN yang berada di jaringan asalnya (homenet) lebih baik ketika berada di jaringan yang sedang dikunjungi (visitnet), hal ini disebabkan dengan metode triangle tunneling paket yang dikirim menuju MN dirutekan ke HA terlebih dahulu sehingga meningkatkan trafik jaringan, selain itu pada uji coba handover terdapat nilai rata-rata delay yang cukup besar yaitu 3.367 detik untuk paket video dan 3.269 detik untuk paket audio, karena pada saat handover, MN membutuhkan waktu untuk memperbaharui koneksi dan melakukan konfigurasi ulang jaringan yang ada.


Author(s):  
Yick Hon Joseph So ◽  
Jidong Wang ◽  
Deddy Chandra

Mobile IP allows a mobile node to roam into a foreign IP network without losing its connection with its peer. Mobile IPv6 uses Route Optimization to improve the routing performance by avoiding the triangle routing problem and adopting Return Routability as a secure process for binding update. Host Identity Protocol (HIP) is an experimental security protocol which provides mobility management and multi-homing with new namespace. HIP has a similar architecture to the Mobile IP with Route Optimization. In this paper, we introduce a Secure Mobile IP with HIP Style Handshaking and Readdressing (SMIP), which provides stronger security, better performance and lower binding cost than Mobile IPv6 does in binding update process. The dependency of the home agent in the new scheme is dramatically decreased. The initiated scheme integrates the primary features of two completely different mobility management solutions and sets up a migration path from mobile-IP based solution to a public-key based solution in mobile IP networks.


Author(s):  
Tayo Arulogun ◽  
Ahmad AlSa'deh ◽  
Christoph Meinel

Mobile Internet Protocol (MIP) enables a mobile node to be recognized via a single IP address while the node moves between different networks. MIP attains the connectivity to nodes everywhere without user intervention. One general improvement in Mobile IPv6 (MIPv6) compared to MIPv4 is the enhanced security. However, there are areas still susceptible to various kinds of attacks. Security approaches for the MIPv6 are still in progress and there are few unsolved concerns and problems. This chapter focuses on MIPv6 security considerations, potential threats, and possible defense mechanisms. The authors discuss and analyze in detail the MIPv6 mobility management and security approaches with respect to the efficiency and complexity and bring forward some constructive recommendations.


Author(s):  
Jani Puttonen ◽  
Ari Viinikainen ◽  
Miska Sulander ◽  
Timo Hamalainen

Mobile IPv6 (MIPv6) has been standardized for mobility management in the IPv6 network. When a mobile node changes its point of attachment in the IPv6 network, it experiences a time due MIPv6 procedures when it cannot receive or send any packets. This time called the handover delay might also cause packet loss resulting undesired quality-of-service degradation for various types of applications. The minimization of this delay is especially important for real-time applications. In this chapter we present a fast handover method called the flow-based fast handover for Mobile IPv6 (FFHMIPv6) to speed up the MIPv6 handover processes. FFHMIPv6 employs flow information and IPv6-in-IPv6 tunneling for the fast redirection of the flows during the MIPv6 handover. Also, FFHMIPv6 employs a temporary hand-off-address to minimize the upstream connectivity. We present the performance results comparing the FFHMIPv6 method to other fundamental handover methods with Network Simulator 2 (ns-2) and Mobile IPv6 for Linux (MIPL) network.


10.28945/3371 ◽  
2009 ◽  
Author(s):  
Martin Ehmke ◽  
Harri Forsgren ◽  
Kaj Grahn ◽  
Jonny Karlsson ◽  
Timo Karvi ◽  
...  

Control signaling messages in Mobile IPv6 are mainly used to inform the home agent (HA) and the correspondent node (CN) about the mobile node’s (MN’s) new address when its network attachment point is changed. In order to prevent various security attacks, these messages must be protected. In the current standard, the control signaling messages between a HA and a MN are authenticated using IPSec, often with IKEv2 and X.509 certificates. Control signaling messages between a MN and a CN are currently protected by an effective but insecure protocol, known as Return Routability. Using IBE (Identity-Based Encryption) for authenticating control signaling messages requires more processing power but significant security enhancements are achieved. The current protocols for protecting control signaling messages are outlined in this paper. Proposed approaches for implementing IBE-authentication between a MN and a HA as well as between a MN and a CN are presented. Environments where the MN and the CN use the same Public Key Generator (PKG) as well as environments where they use different PKGs are taken into account. Finally, the performance of some proposed signaling protocols is estimated. An overview of IBE is given and the elements and operations needed to set up an IBE infrastructure are described in an appendix.


2015 ◽  
Vol 72 (5) ◽  
Author(s):  
Mojtaba Alizadeh ◽  
Mazdak Zamani ◽  
Sabariah Baharun ◽  
Wan Haslina Hassan ◽  
Touraj Khodadadi

Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this protocol, all mobility signaling procedures are completed by network entity not mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure has a key role to protect the network against different security threats; however, the details of authentication procedure is not specified in this standard. In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. The existing authentication approaches can be analyzed based on these criteria to find security issues.


Sign in / Sign up

Export Citation Format

Share Document