A TOTP-Based Enhanced Route Optimization Procedure for Mobile IPv6 to Reduce Handover Delay and Signalling Overhead

نویسندگان

  • Peer Azmat Shah
  • Halabi B. Hasbullah
  • Ibrahim A. Lawal
  • Abubakar Aminu Mu'azu
  • Low Tang Jung
چکیده

Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secured Route Optimization and Micro-mobility with Enhanced Handover Scheme in Mobile IPv6 Networks

خسارات وارد شده به شبکه گاز شهری در یک زلزله می­تواند زیان­های زیادی از جمله خسارت ناشی از آتش­سوزی در شبکه زیر ساخت، و خسارت ناشی از قطع خدمات رسانی، تعمیر و تعویض اعضای شبکه، را در بر داشته باشد. در این مقاله یک مدل آتش­سوزی پیشنهاد شده است. مدل پیشنهادی در یک مدل نیمه احتمالاتی مرسوم برای برآورد خسارت­های مختلف ناشی از آسیب دیدن شبکه گاز شهری، به کار برده شده است. هدف از این کار توسعه یک ابز...

متن کامل

Localized Management for Proxy Mobile IPv6

Proxy Mobile IPv6 is a promising protocol for supporting mobility. Unlike Mobile IPv6, which is based on hostmobility, the Proxy Mobile IPv6 is based on network-based mobility so that it can remove additional implementations on a Mobile Node (MN). Due to this feature, Proxy Mobile IPv6 has been considered as a better protocol than Mobile IPv6 in supporting mobility. However, PMIPv6 still has a ...

متن کامل

An Optimization Handover Scheme Based On HMIPv6

The process that mobile node still maintains its connectivity when moved from one access router (AR) to another access router is called handover. The handover technology is one of the most important technologies for the quality of real-time operation. In order to reduce the handover delay. Fast Mobile IPv6 (FMIPv6), Hierarchical Mobile IPv6 (HMIPv6) and Fast Hierarchical Mobile IPv6 are studied...

متن کامل

Mobility Agents: Avoiding the Route Optimization Signaling on Large Servers

Mobile IPv6 has been designed by the IETF to provide mobility to the Internet. With mobility a user can move and change his point of attachment to the Internet without losing his network connections. If Mobile IPv6 was deployed on the Internet, typically Correspondent Nodes would be large servers of current content providers. These large servers have thousands of clients and in such scenario ma...

متن کامل

An Optimized Scheme for Mobile IPv6 Handover Between Domains Based on AAA

When Mobile IPv6 is deployed in commercial network, a mobile node needs AAA services for authentication, authorization and accounting. AAA and Mobile IPv6 are operated independently. Hence schemes which merge these protocols have been emerged. These schemes enable the mobile node to establish a security association between the mobile node and a home agent, and to perform a home binding update d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014