Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Efficient and Secure AAA for Mobile Router in Network Mobility Environment (A3MR-NEMO)

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2020
Authors:
William Asiedu, K.O. Boateng
10.5120/ijca2020920676

William Asiedu and K O Boateng. Efficient and Secure AAA for Mobile Router in Network Mobility Environment (A3MR-NEMO). International Journal of Computer Applications 175(17):12-19, September 2020. BibTeX

@article{10.5120/ijca2020920676,
	author = {William Asiedu and K.O. Boateng},
	title = {Efficient and Secure AAA for Mobile Router in Network Mobility Environment (A3MR-NEMO)},
	journal = {International Journal of Computer Applications},
	issue_date = {September 2020},
	volume = {175},
	number = {17},
	month = {Sep},
	year = {2020},
	issn = {0975-8887},
	pages = {12-19},
	numpages = {8},
	url = {http://www.ijcaonline.org/archives/volume175/number17/31543-2020920676},
	doi = {10.5120/ijca2020920676},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Mobile Networks play a vital role in the communication and networking fields. Usage of mobile devices and mobile applications are increasing because of its any-where any-time strategy. Many mobile applications, services, algorithms and protocols are developed to provide a better quality of service to the users. When the number of users increases, the mobile network operators search for new methodologies to adopt the vast number of users. The increasing number of users increases the signaling overhead and security issues. To offer a solution to these problems, we propose a mechanism base on Authentication, Authorization and Accounting system on NEMO. This mechanism provides efficient, reliable and secure communication among mobile network nodes. Experiment results shows consistency with theoretical analysis and exhibit better protection and low overhead compared to recent related studies through NS3.

References

  1. Wee Hock Desmond Ng, Zhili Sun, Haitham Cruickshank, “Group Key Management with Network Mobility”, 13th IEEE International Conference on Networks jointly held with the 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, pp. 716 – 721.
  2. Wenjing Ma, Song Mei, Zhang Yong, Lin Xin, Zhang Huan, “An Optimization Method to Develop AAA Architectures with MIPv6 Mobility Support”, Proceedings of the IEEE Asia- Pacific Services Computing Conference, 2008, pp. 948 – 952.
  3. William Stallings, “Mobile IP”, The Internet Protocol Journal, Volume 4, Number 2, 2001, pp. 2-14.
  4. Wilkes J. E., “Privacy and Authentication Needs for PCS", IEEE Personal Communications, Volume 2, 1995, pp. 11–15.
  5. Yinxin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen, “Multiple Key Sharing and Distribution Scheme With (n, t) Threshold for NEMO Group Communications”, IEEE Journal on Selected Areas In Communications, Volume 24, Number 9, 2006, pp. 1738-1747.
  6. Zhang Jie, LIU Yuan-an, MA Xiao-lei, JIA Jin-tao, “AAA Authentication for Network Mobility”, Journal of China Universities of Posts and Telecommunications - ScienceDirect, Volume 19, Issue 2, 2012, pp. 81-86.
  7. Abu Zafar M. Shahriar, Mohammed Atiquzzaman and William Ivancic, “Route Optimization in Network Mobility: Solutions, Classification, Comparison, and Future Research Directions”, IEEE Communications Surveys & Tutorials, Volume 12,Number 1, 2010, pp. 24-38.
  8. Ming-Chin, C., & Jeng, F. L. (2008). LMAM: A Lightweight Mutual Authentication Mechanism for Network Mobility in Vehicular Networks. Proceedings of the IEEE Asia-Pacific Services Computing Conference, (pp. 1611-1616).
  9. Adeyinka O, “Internet Attack Methods and Internet Security Technology”, Proceedings of the Second Asia International Conference on Modeling & Simulation, 2008, pp. 77-82.
  10. Alexandru Petrescu, Alexis Olivereau, “Mobile VPN and V2V NEMO for Public Transportation”, Proceedings of the 9th International Conference on Intelligent Transport Systems Telecommunications, 2009, pp. 63-68.
  11. Angel Cuevas, Ruben Cuevas, Manuel Uruena, Carmen Guerrero, “A Novel Overlay Network for a Secure Global Home Agent Dynamic Discovery”, Springer LNCS 4806, 2007, pp. 921-930.
  12. Arkko J, Kempf J, Zill B, Nikander P, “SEcure Neighbor Discovery (SEND)”, RFC 3971, 2005.
  13. Aziz A, Diffie W, “Privacy and Authentication for Wireless Local Area Networks, IEEE Personal Communications, Volume 2, 1994, pp. 25-31.
  14. Brown D, “Techniques for Privacy and Authentication in Personal Communication System”, IEEE Personal Communications, Volume 2, 1995, pp. 6-10.
  15. Calhoun P, Loughney J, Guttman E, Zorn G, Arkko J, “Diameter Base Protocol”, RFC 3588, 2003.
  16. Calhoun P, Johansson T, Perkins C, Hiller T, McCann P, “Diameter Mobile IPv4 Application”, RFC 4004, 2005.
  17. Carlos J. Bernarods, Ignacio Soto and Maria Calderon, “IPv6 Network Mobility”, The Internet Protocol Journal, Volume. 10, Number. 2, 2007, pp. 16-27.
  18. Christian Bauer, “NEMO Route Optimization with Strong Authentication for Aeronautical Communications”, Proceedings of the IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, Toronto, 2011, pp.788-793.
  19. Cuevas R, Guerrero C, Cuevas A, Caldern M, Bernardos CJ, “P2P Based Architecture for Global Home Agent Dynamic Discovery in IP Mobility”, Proceedings of the IEEE 65th Vehicular Technology Conference, 2007, pp. 899-903.
  20. David Binet, Antony Martin, Brahim Gaabab, “A Proactive Authentication Integration for the Network Mobility”, Proceedings of the IEEE International Conference on Wireless and Mobile Communications, 2007, pp. 53-58.
  21. Laat C, Gross G, Gommans L, Vollbrecht J, Spence D, “Generic AAA Architecture”, RFC 2903, 2000.
  22. Devarapalli V, Wakikawa R, Petrescu A, Thubert P, “Network Mobility (NEMO) Basic Support Protocol”, RFC 3963, 2005.
  23. Donghai Shi, Chaojing Tang, “A Fast Handoff Scheme Based on Local Authentication in Mobile Network”, Proceedings of the 6th International Conference on ITS Telecommunications, 2006, pp. 1025-1028.

Keywords

Access router, Algorithm, AAA, NEMO, Mobile Route