SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018
DOI : 10.5121/ijcnc.2018.10306 75
IMPROVED HANDOVER ALGORITHM TO AVOID
DUPLICATION AAA AUTHENTICATION IN PROXY
MIPV6
Hewei Yu1
and Meiling Zhou2
1
School of Computer Science & Engineering, South China University of Technology,
Guang Zhou, P.R.China
2
GF Fund Management Co., Ltd., Guang Zhou, P.R.China
ABSTRACT
This paper proposes an improved handover algorithm which does not need authenticating again if Mobile
Node moves within the same Proxy MIPv6 domain. When MN enters PMIPv6 domain at the first time, it
needs to make an AAA authentication. But when MN moves between MAGs in the same domain, it can
perform handover procedure without the second times of AAA authentication, and speed the handover
process. We built a structure of PMIPv6 including AAA server on NS-2 and set up a real test-bed, and
proposed an improved handover algorithm for PMIPv6 based on AAA authentication. The simulation and
testing results show that the new scheme can effectively reduce the handover latency and ratio of packet
loss, and improve network performance.
KEYWORDS
PMIPv6; AAA; handover; fast handover
1. INTRODUCTION
Nowadays, the huge commercial demand for mobile Internet has brought new opportunity and
challenge of technology. In 2008, the Internet Engineering Task Force (IETF) proposed a
network-based mobility management protocol called Proxy MIPv6[1]
. Because of the bright
prospect of PMIPv6, researchers all over the world have carried out extensive and in-depth study
on PMIPv6, and provides various effective handoff scheme. As a whole, the research on PMIPv6
has many aspects, including security, handover performance etc. On the security mechanism of
PMIPv6, RFC5779[2]
defined AAA for authentication ,authorization and accounting.
Document[3] designed and implemented the authentication and authorization of PMIPv6 network
system, the testing results proved the validity and feasibility of the certification system. On the
handover performance of PMIPv6, Kang[4] proposed a seamless handover scheme using the
neighbor discovery message of IPv6 to reduce the handover latency and packet buffering at the
Mobile Access Gateway (MAG) to avoid the on-the-fly packet loss during a handover for
PMIPv6. However, it is unable to satisfy the real-time demand of higher business communication.
Document[5] proposes a novel low latency handover scheme for PMIPv6 using Media
Independent Handover (MIH) services. Magagula [6] tested the handover performance of
PMIPv6 with and without the IEEE 802.21 MIH services in a heterogeneous wireless networks’
environment. The results showed that the handover performance had improved if the IEEE 802.21
MIH services is used, while there have some problem such as Signal overload. Of course, A
scheme to Reduce Packet Loss during PMIPv6 Handover is called PL-PMIPv6, which is similar
to the fast handover for MIPv6, and FH-PMIPv6 was improved based on it.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018
76
In the PMIPv6 system include AAA severs, when MN enters PMIPv6 domain at the first time, it
is required to be authenticated. This paper proposes a scheme, MN only need to be authenticated
once in the same domain. In another word, when MN moves into a new MAG in the same
domain, it does not need to be authenticated again, so this schema can minimize the
authentication latency and packet loss.
The rest of this paper is arranged as follows: the implementation of AAA server for PMIPv6 is
introduced in section 2. Section 3 introduces the improved handover schema to minimize typical
authentication procedures. Simulation in NS-2 and testing on test-bed and results analysis are
provided in section 4 and 5 respectively. This paper is concluded in section 5.
2. IMPLEMENTATION OF AAA SERVER FOR PMIPV6[7]
PMIPv6 introduces two network entities: MAG (Mobile Access Gateway) and LMA(Local
Mobility Anchor). LMA is the home agent for the MN in a PMIPv6 domain. It is the topological
anchor point for the MN’s home network prefix(es) and is the entity that manages the MN’s
binding state. MAG is a function on an access router that manages the mobility-related signalling.
It is responsible for tracking the MN’s movements to and from the access link and for signalling
the MN’s local mobility anchor.
In this paper, the functions of AAA server are implemented in NS2 using C++ language and TCL
scripts. We add two structures that is AAA server and list of policy profile. Figure1. (a) and
Figure1. (b) show the working flow chart of AAA server.
After AAA server is implemented, Figure.2 shows the signal flow when MN moves from P-MAG
(pre-MAG) to N-MAG (new-MAG) in the same PMIPv6 domain.
Figure 1. (a) Create list of policy profile
(b) Judging the legality of MN
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018
77
The whole handover procedure goes as follows:
1) P-MAG sends DeReg PBU message (including MN-HNP and Proxy-CoA) to LMA when
it detects that MN is going to leave. Then LMA can release the binding between MN-HNP
and Proxy-CoA of MN.
2) LMA starts the delay timer immediately when it receivs DeReg PBU message. So LMA
allows N-MAG to wait for a period of time before updating the binding cache entry, and
replies DeReg PBA message to P-MAG simultaneously.
3) P-MAG receives DeReg PBA message.
4) When N-MAG detects the attachment of MN, N-MAG obtains information about MN.
Then MN sends RS message to N-MAG.
5) N-MAG sends QUERY message to AAA server after received RS message, then gets
policy profile of MN.
6) After MN’s successful access authentication, N-MAG sends PBU message to LMA to
update the LMA about the current location of MN.
7) Upon receiving the PBU message, LMA updates binding cache entry. LMA sends PBA
message including MN-HNP.
8) After receiving the PBA message, N-MAG sets up a tunnel to LMA and adds a default
route over tunnel to LMA. N-MAG then sends RA message to MN on the access link to
advertise the MN-HNP.
9) When MN receives RA and know that there are no change on L3 interface after checking,
it keeps the same IP address and uses it for packet delivery.
Figure 2. Signal flow of Proxy MIPv6 based on Inter-Domain Handover
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018
78
As signal flow chart shows, the handover schemes for PMIPv6 networks includes deregistration(
1)-3) ),authentication( 4)-5) ) and registration( 6)-9) ) phases.
3. IMPROVED HANDOVER SCHEME
In order to reduce the longer latency and extra cost caused by combining the AAA function while
guaranteeing the handover performance, some handover procedure have been proposed as
follows: in document[8], the AAA server selects the most suitable LMA based on the load
information received from the LMAs. Moreover, the LMA performs admission control based on
the number of current mobile nodes registered to the LMA. Document[9] proposed adaptive
context transfer schemes for a fast handoff in Proxy MIPv6 which reduces the latency in AAA
authentication and specifies context transfer scenarios taking into account proactive and reactive
handover. When MNs attempt to handover inter/intra domain, the AAA context information
stored in LMAs and MAGs will be used to support the handover without visiting the AAA server.
Other documents put forward an configuration file based intra-domain handover method in
PMIPv6. Optimize the intra-domain handover performance by expanding the contents of the
configuration file and adding the proxy care-of address option. Of course, there are many
improved schemes based on AAA server. In this section we discuss our proposed scheme to
reduce the handover latency of Proxy MIPv6 which is based on intra domain.
As we know, handover latency in PMIPv6 is caused due to following four latencies[10]
:
Link switching latency
AAA authentication latency
MN registration latency
Latency due to Router Solicitation(RS) message and Router Advertisement(RA) message
In the proposed scheme, the handover latency is reduced due to AAA authentication again in the
same domain.
As mentioned previously, the MAG detects the movements of MN and performs mobility-related
signalling with the LMA in place of the MN. As Fig3 shows, the serving MAG(i.e.,P-MAG) will
send handover initial (HI) message to the target MAG(i.e.,N-MAG) when MN is going to leave.
Then N-MAG will be told the MN has been authentication. First ,N-MAG stores information
(such as the AAA initiation information of MN(i.e.,MN-ID) and the address of LMA ) from HI
message. Then N-MAG sends back a handover acknowledge(HACK) message to P-MAG.
During this time, MN has not disconnected from P-MAG, so all the data packets are forwarded
through P-MAG as before.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018
79
Figure 3. Signal flow of proposed Proxy MIPv6 based on intra-domain.
P-MAG sends DeReg PBU message to LMA while detects MN is disconnect. The deregistration
period is the same as mentioned previously.
When N-MAG detects that MN enters or gets the Route Solicitation(RS) message from MN, it
will check whether the MN’s information (including MN-ID and LMAA) have already existed. If
N-MAG has MN’s information, it means that MN has been authenticated. So it is not need to
registration again. Here we give some analysis about handover latency. Usually handover latency
is marked by the maximum time interval between MN receives the last packet from the P-MAG
and the first packet from N-MAG. Using some marks such as TDeReg (deregistration) ,TAuth
(authentication), TReg(registration), TMN-MAG (MN and MAG), TMAG-LMA (MAG and LMA), TMAG-
AAA(MAG and AAA) and TL2 (layer2 handover), we can get handover latency (HL) of traditional
algorithm according to Fig4.1. ]
HL= TDeReg +TL2 +TRS + TAuth + TReg + TRA
= 4TMAG,LMA+TL2 +2TMN,MAG +2TMAG,AAA (1)
The handover latency (HL) of proposed algorithm is as the following according to Figure 4 (b).
HL= TDeReg +TL2 +TRS + TReg + TRA
= 4TMAG,LMA+TL2+2TMN,MAG (2)
Compare equation (1) and (2), you will find that the delay of AAA authentication is eliminated in
our algorithm.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018
80
Figure 4. (a) Handover latency of PMIPv6
Figure 4. (b) Handover latency of proposed PMIPv6
4. SIMULATION AND ANALYSIS
We have taken simulation using NS-2 and compared the performance of the proposed scheme
with the previous and the ordinary one when MN moves between MAGs in the same domain. In
the simulation, we assumed correspondent node(CN) sent packets to MN and MN moved form
P-MAG to N-MAG , the packets from CN get to MAG through LMA and router. The simulation
model is shown in Figure 5. The time in the simulation is controlled in 20 seconds. CN sent data
packets at intervals of 0.05s after 1.0 second. At 14.4 second, MN moved away from P-MAG and
went toward N-MAG.
CN
P-MAG N-MAG
MN
AP
AP
Router
100Mb,10ms
30m/s
100Mb,1ms 100Mb,1ms
LMA
100Mb,1ms
Figure 5. Practical simulation model
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018
81
4.1. Handover latency comparison
The handover latency comparison between ordinary (marked by black) and proposed (marked by
red) scheme is show in Figure 6. The abscissa represents the simulation time, the ordinate
represents handover latency. Because of MN has not entered PMIPv6 network at the starting
time, there are not handover latency and the delay time is 0s. The packets transfer delay is 0.05s.
There are two high vertical line, the first line represents
0 5 10 15 20
-0.1
0.0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0
1.1
delay(s)
time (s)
delay.tr
P-delay.tr
Figure 6. Handover latency comparison between ordinary and proposed scheme
The latency that MN enters a new Proxy MIPv6 domain and attaches to P-MAG. The graph
shows, handover latency is sharp increased up to 1.02s at 1s. It is the same as the ordinary
scheme. However, there are visible difference in second line. The second line represents the
latency that MN enters N-MAG. The handover latency of ordinary scheme is sharp increased up
to 0.5s while it is 0.45s in proposed scheme, which shows that the proposed scheme can reduce
the handover latency.
Table 1 shows some parameters about handover latency in the simulation.
Table 1. Some parameters in the simulation
Both of the start time of handover of the two scheme are 14.4s. The proposed scheme has finished
handover at 14.85s, and the ordinary one has finished at 14.9s.
Handover latency of the ordinary scheme =0.5s
Handover latency of the proposed scheme =0.45s
Obviously, the handover latency of the proposed scheme has been reduced 0.05s (0.5-
0.45=0.05s). It is decreased by 10% ((0.05/0.5)*100%=10%) according to our proposal.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018
82
4.2. Packet loss rate
Figure 7 shows the number of packet loss comparison of ordinary and proposed scheme. In this
simulation, ordinary scheme lost 9 packets. As while as the proposed scheme lost 8 which is less
than the ordinary one.
In the simulation, the largest number of data packet is 383 in two scheme by checking the
simulation output trace file. So we can get table2.
0 5 10 15 20
0
1
2
3
4
5
6
7
8
9
10
lostpackets
time (s)
lost.tr
P-lost.tr
Figure 7. Number of packet loss of ordinary and proposed scheme
All of the forward data packets are 383.
The number of packet loss are 9 and 8 in ordinary and proposed scheme respectively.
Obviously, the ratio of packet loss of our proposed scheme has been reduced 1(9-8=1). So the
ratio of packet loss is decreased by 11.11% ((1/9)*100%≈11.11%) according to our proposal.
To sum up, the proposed scheme is characterized by completed N-MAG authentication in
advance of handover, so there is no need of authentication again. It is clear from the result of
simulation, the proposed scheme reduces the handover latency and the ratio of packet loss without
increased throughput.
Table 2. packet loss comparison of ordinary and proposed scheme
5. TESTING ON TEST-BED
5.1. Set up test-bed
For further proving, we set up a test-bed about Proxy MIPv6 according to document[11] which
introduced an open source project OAI PMIPv6. Based on it we built up a real test-bed for
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018
83
wireless LAN. Furthermore, we modify the code and implement our handover algorithm. Figure 8
shows the experimental topology of our test-bed:
CN
P-MAG N-MAG
MNAP
AP
Router
2001:2::2
2001:100::c646:19ff:fea1:412a
2001:100::2 (eth1) 2001:100::3 (eth1)
LMA
2001:2::1 (eth0)
2001:100::1 (eth1)
2001:1::1 (eth0) 2001:1::2 (eth0)
Figure 8. A real PMIPv6 test-bed [11]
P-MAG, N-MAG and LMA should be configured the kernel and installed some software.
Correspondent node (CN) and MN do not need any configuration. This test-bed is based on
ubuntu 10.04, linux 2.6.32 kernel. The whole set-up procedures are described as follow:
1) Install the required packages including “libpcap-dev”, “indent”, “bison”, “flex”, “iproute-
dev”, “libc6-dev”, “libssl-dev”, “autoconf”, “libtool”, “macchanger”, “python-netaddr”.
2) Recompile and reinstall the kernel to make some IPv6 features available. MAG and LMA
need different features.
3) Install SYSLOG Server on MAGs. It can detect MN’s attachment and detachment by
receiving message from access point.
4) Install FreeRadius Client in MAGs and LMA, configure file “radiusclient.conf” and server,
modify the IP of FreeRadius Server and session key.
5) Install FreeRadius Server in LMA, add user authentication information in file
/usr/local/etc/raddb/users, including MN-ID, home network prefix and user password.
6) Compile and install PMIP6D which is the main program of this test-bed.
7) All the computers and routers should be linked as Figure 8.
8) Configure the wireless routers so that it works as AP, insure them would not add their MAC
Address to the packets that they forward. Enable and configure their SYSLOG client, make
routers send “syslog” message to corresponding MAGs.
9) Start the program by using well-configured “python” script after all installation above.
We test the proposed scheme’s handover latency in our test-bed and compare with the traditional
scheme. Since the L2 layer accessing takes a long time (scale in seconds), which is much larger
than the L3 layer handover latency (scale in milliseconds), using the traditional latency definition
is not easy to see the improvement. Therefore, we adopt a new definition which make the printing
output “pmip_mag_recv_rs: Router Solicitation received” as the beginning of handover, which
means N-MAG just detects MN’s attachment. And we make the output “mag_end_registration:
Out of setup route” as the end of the handover, which means N-MAG has completed signalling
exchange with LMA, built tunnel and sent RA message to MN.
We have tested the traditional handover scheme and proposed scheme 100 times each, including
50 times switch to P-MAG from N-MAG and 50 times switch to N-MAG from P-MAG. Test data
are shown in Figure 9:
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018
84
Figure 9. Handover latency of the traditional and proposed scheme
The average of test data is shown in table 3.
Table 3. Test data average
These data show that, due to the cancellation of the unnecessary AAA authentication, handover
latency in proposed scheme has been decreased 12.62%. Thus, the improved scheme is superior
to the traditional one.
6. CONCLUSIONS
In this paper, we introduce the present development of PMIPv6 and the way to add AAA server
to PMIPv6 in NS-2. What’s more, we have proposed an improved handover scheme which can
minimize handover latency and ratio of packet loss by omitting operation of AAA authentication
again in the same domain. We evaluate the performance of both the ordinary and the proposed
scheme in NS-2 and a real test-bed. The simulation and testing results show that our proposed
scheme can effectively reduce the handover latency and ratio of packet loss. However, there are
some drawbacks, for example, it is only satiable for intra-domain handover, the security issues is
not perfect etc. Further work should include the improvement and simulation jobs aimed at the
problems above.
International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018
85
ACKNOWLEDGEMENTS
This study is supported by National Natural Science Foundation of China (No. 61070179),
Guangzhou Science & Technology Project (No.2014J4100019), Key Collaborative Innovation
Project among Industry, University and Institute of Guangzhou(No. 201604010001).
REFERENCES
[1] S. Gundavelli (Ed.), K. Leung, V. Devarapalli, K. Chowdhury and B. Patil, 'Proxy Mobile IPv6',
Internet Engineering Task Force RFC 5213, August 2008.
[2] J. Korhonen, Ed.Diameter Support for Proxy Mobile IPv6[S].IETF RFC 5779,2010.
[3] LV Jianhua, ZHOU Huachun, QIU Luwei,et al. Implementation of authentication and authorization of
proxy mobile IPv6. Computer Engineering and Application, 2012,48(22):109-116.
[4] Ju Eun Kang, Dong Won Kun, Yang Li, You Ze Cho. Seamless Handover Scheme for Proxy Mobile
IPv6[J]. IEEE Computer Society, 2008,10.1109/WiMob:410-414.
[5] Igor Kim, Young Chul Jung, Yong Tak Kim. Low Latency Proactive Handover Scheme for Proxy
MIPv6 with MIN[J],SpringerLink, 2008, Volume 5297:344-353.
[6] Linoh A.Magagula, Olabisi E.Falowo, H.Anthony Chan.Handover Optimization in Heterogeneous
Wireless Networks: PMIPv6 vs. PMIPv6 with MIH [C] .Southern Africa Telecommunication
Networks and Applications Conference, 2009.
[7] Nitesh M. Tarbani, B.R. Chandavarkar. Implementation of AAA Server for PMIPv6 in NS-2[J].
PDCTA,2011. IEEE, 2011.
[8] Viswanathan M, Yi M K, Yun S Y, et al. A novel local mobility anchor selection scheme for proxy
mobile IPv6 networks[C], Proceedings of the 6th International Conference on Ubiquitous Information
Management and Communication. ACM, 2012: 49.
[9] Baek J J, Song J S. Adaptive context transfer scheme for fast handoff in Proxy Mobile IPv6[C], Next
Generation Mobile Applications, Services and Technologies, 2008. NGMAST'08. The Second
International Conference on. IEEE, 2008: 127-130.
[10] Banerjee K, Tahasin Z I, Uddin R. An Efficient Handover Scheme for PMIPv6 in IEEE
802.16/WiMAX Network[J]. International Journal of Electrical & Computer Sciences, 2011, 11(5)
[11] Giuliana Iapichino, Christian Bonnet. Experimental Evaluation of Proxy Mobile IPv6: an
Implementation Perspective [J]. IEEE Wireless Communications and Networking Conference
(WCNC), 2010 IEEE, April 2010
AUTHORS
Hewei Yu Professor of South China University of Technology. His research interests focus
on integration technology of heterogeneous wireless networks. He directed several projects
supported by the National Natural Science Foundation of China, Science & Technology
projects of Guangdong Province, and Guangzhou City.
Meiling Zhou Got her Master degree from South China University of Technology. Her
research direction is handoff technology of Proxy Mobile IPv6. Now she is working in the
GF Fund Management Co., Ltd.

More Related Content

What's hot

ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKijngnjournal
 
Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices csandit
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
 
Gprs persentation
Gprs persentation Gprs persentation
Gprs persentation sumit singh
 
Game Traffic Analysis: An MMORPG Perspective
Game Traffic Analysis: An MMORPG PerspectiveGame Traffic Analysis: An MMORPG Perspective
Game Traffic Analysis: An MMORPG PerspectiveAcademia Sinica
 
Web Service QoS Prediction Approach in Mobile Internet Environments
Web Service QoS Prediction Approach in Mobile Internet EnvironmentsWeb Service QoS Prediction Approach in Mobile Internet Environments
Web Service QoS Prediction Approach in Mobile Internet Environmentsjins0618
 
Callflows 121002232008-phpapp01
Callflows 121002232008-phpapp01Callflows 121002232008-phpapp01
Callflows 121002232008-phpapp01Abiy Almaw
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...eSAT Publishing House
 
Wp ip-mpls-based-vpns
Wp ip-mpls-based-vpnsWp ip-mpls-based-vpns
Wp ip-mpls-based-vpnssubha_87
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...eSAT Journals
 
2.5G, second and half generation, All about 2.5..
2.5G, second and half generation, All about 2.5..2.5G, second and half generation, All about 2.5..
2.5G, second and half generation, All about 2.5..Muhammad Ahad
 
Scalability Enhancement of Push/Pull Server functions by converting Stateless...
Scalability Enhancement of Push/Pull Server functions by converting Stateless...Scalability Enhancement of Push/Pull Server functions by converting Stateless...
Scalability Enhancement of Push/Pull Server functions by converting Stateless...IOSR Journals
 

What's hot (19)

Congestion Control in NDN
Congestion Control in NDNCongestion Control in NDN
Congestion Control in NDN
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Gprs[1]
Gprs[1]Gprs[1]
Gprs[1]
 
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
 
Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices Medium Access Control with Scheduled Group Contention for Massive M2M Devices
Medium Access Control with Scheduled Group Contention for Massive M2M Devices
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
 
Assignment2
Assignment2Assignment2
Assignment2
 
Gprs persentation
Gprs persentation Gprs persentation
Gprs persentation
 
Game Traffic Analysis: An MMORPG Perspective
Game Traffic Analysis: An MMORPG PerspectiveGame Traffic Analysis: An MMORPG Perspective
Game Traffic Analysis: An MMORPG Perspective
 
Web Service QoS Prediction Approach in Mobile Internet Environments
Web Service QoS Prediction Approach in Mobile Internet EnvironmentsWeb Service QoS Prediction Approach in Mobile Internet Environments
Web Service QoS Prediction Approach in Mobile Internet Environments
 
Callflows 121002232008-phpapp01
Callflows 121002232008-phpapp01Callflows 121002232008-phpapp01
Callflows 121002232008-phpapp01
 
GPRS : Architecture and Applications
GPRS : Architecture and ApplicationsGPRS : Architecture and Applications
GPRS : Architecture and Applications
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
 
Wp ip-mpls-based-vpns
Wp ip-mpls-based-vpnsWp ip-mpls-based-vpns
Wp ip-mpls-based-vpns
 
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...Performance evaluation of broadcast mac and aloha mac protocol for underwater...
Performance evaluation of broadcast mac and aloha mac protocol for underwater...
 
Arrjay
ArrjayArrjay
Arrjay
 
2.5G, second and half generation, All about 2.5..
2.5G, second and half generation, All about 2.5..2.5G, second and half generation, All about 2.5..
2.5G, second and half generation, All about 2.5..
 
Scalability Enhancement of Push/Pull Server functions by converting Stateless...
Scalability Enhancement of Push/Pull Server functions by converting Stateless...Scalability Enhancement of Push/Pull Server functions by converting Stateless...
Scalability Enhancement of Push/Pull Server functions by converting Stateless...
 

Similar to IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY MIPV6

A Micro-Mobility Management Scheme for Handover and Roaming
A Micro-Mobility Management Scheme for Handover and RoamingA Micro-Mobility Management Scheme for Handover and Roaming
A Micro-Mobility Management Scheme for Handover and RoamingCSCJournals
 
A novel secure handover mechanism in
A novel secure handover mechanism inA novel secure handover mechanism in
A novel secure handover mechanism inijitcs
 
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute Operations
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute OperationsQuantitative Evaluation for PMPIv6 Multicast Fast Reroute Operations
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute OperationsjournalBEEI
 
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
 
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...IJCSIS Research Publications
 
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...IOSR Journals
 
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6journalBEEI
 
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIS
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSISMIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIS
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIScscpconf
 
Comparative study on priority based qos
Comparative study on priority based qosComparative study on priority based qos
Comparative study on priority based qosijwmn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmijcncs
 
Developing route optimization based pmi pv6 testbed for reliable packet trans...
Developing route optimization based pmi pv6 testbed for reliable packet trans...Developing route optimization based pmi pv6 testbed for reliable packet trans...
Developing route optimization based pmi pv6 testbed for reliable packet trans...redpel dot com
 
Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)Peter R. Egli
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015TTA_TNagar
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015TTA_TNagar
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...RESHAN FARAZ
 
An enhanced group mobility protocol for 6 lowpan based wireless body area net...
An enhanced group mobility protocol for 6 lowpan based wireless body area net...An enhanced group mobility protocol for 6 lowpan based wireless body area net...
An enhanced group mobility protocol for 6 lowpan based wireless body area net...Kamal Spring
 
Paper id 36201515
Paper id 36201515Paper id 36201515
Paper id 36201515IJRAT
 

Similar to IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY MIPV6 (20)

A Micro-Mobility Management Scheme for Handover and Roaming
A Micro-Mobility Management Scheme for Handover and RoamingA Micro-Mobility Management Scheme for Handover and Roaming
A Micro-Mobility Management Scheme for Handover and Roaming
 
A novel secure handover mechanism in
A novel secure handover mechanism inA novel secure handover mechanism in
A novel secure handover mechanism in
 
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute Operations
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute OperationsQuantitative Evaluation for PMPIv6 Multicast Fast Reroute Operations
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute Operations
 
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
 
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
 
A01230105
A01230105A01230105
A01230105
 
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
 
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
 
L017548287
L017548287L017548287
L017548287
 
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIS
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSISMIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIS
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIS
 
Comparative study on priority based qos
Comparative study on priority based qosComparative study on priority based qos
Comparative study on priority based qos
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Performance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithmPerformance Enhancement of VNSIP approach, using MCAC algorithm
Performance Enhancement of VNSIP approach, using MCAC algorithm
 
Developing route optimization based pmi pv6 testbed for reliable packet trans...
Developing route optimization based pmi pv6 testbed for reliable packet trans...Developing route optimization based pmi pv6 testbed for reliable packet trans...
Developing route optimization based pmi pv6 testbed for reliable packet trans...
 
Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
 
An enhanced group mobility protocol for 6 lowpan based wireless body area net...
An enhanced group mobility protocol for 6 lowpan based wireless body area net...An enhanced group mobility protocol for 6 lowpan based wireless body area net...
An enhanced group mobility protocol for 6 lowpan based wireless body area net...
 
Paper id 36201515
Paper id 36201515Paper id 36201515
Paper id 36201515
 

More from IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 

More from IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY MIPV6

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018 DOI : 10.5121/ijcnc.2018.10306 75 IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY MIPV6 Hewei Yu1 and Meiling Zhou2 1 School of Computer Science & Engineering, South China University of Technology, Guang Zhou, P.R.China 2 GF Fund Management Co., Ltd., Guang Zhou, P.R.China ABSTRACT This paper proposes an improved handover algorithm which does not need authenticating again if Mobile Node moves within the same Proxy MIPv6 domain. When MN enters PMIPv6 domain at the first time, it needs to make an AAA authentication. But when MN moves between MAGs in the same domain, it can perform handover procedure without the second times of AAA authentication, and speed the handover process. We built a structure of PMIPv6 including AAA server on NS-2 and set up a real test-bed, and proposed an improved handover algorithm for PMIPv6 based on AAA authentication. The simulation and testing results show that the new scheme can effectively reduce the handover latency and ratio of packet loss, and improve network performance. KEYWORDS PMIPv6; AAA; handover; fast handover 1. INTRODUCTION Nowadays, the huge commercial demand for mobile Internet has brought new opportunity and challenge of technology. In 2008, the Internet Engineering Task Force (IETF) proposed a network-based mobility management protocol called Proxy MIPv6[1] . Because of the bright prospect of PMIPv6, researchers all over the world have carried out extensive and in-depth study on PMIPv6, and provides various effective handoff scheme. As a whole, the research on PMIPv6 has many aspects, including security, handover performance etc. On the security mechanism of PMIPv6, RFC5779[2] defined AAA for authentication ,authorization and accounting. Document[3] designed and implemented the authentication and authorization of PMIPv6 network system, the testing results proved the validity and feasibility of the certification system. On the handover performance of PMIPv6, Kang[4] proposed a seamless handover scheme using the neighbor discovery message of IPv6 to reduce the handover latency and packet buffering at the Mobile Access Gateway (MAG) to avoid the on-the-fly packet loss during a handover for PMIPv6. However, it is unable to satisfy the real-time demand of higher business communication. Document[5] proposes a novel low latency handover scheme for PMIPv6 using Media Independent Handover (MIH) services. Magagula [6] tested the handover performance of PMIPv6 with and without the IEEE 802.21 MIH services in a heterogeneous wireless networks’ environment. The results showed that the handover performance had improved if the IEEE 802.21 MIH services is used, while there have some problem such as Signal overload. Of course, A scheme to Reduce Packet Loss during PMIPv6 Handover is called PL-PMIPv6, which is similar to the fast handover for MIPv6, and FH-PMIPv6 was improved based on it.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018 76 In the PMIPv6 system include AAA severs, when MN enters PMIPv6 domain at the first time, it is required to be authenticated. This paper proposes a scheme, MN only need to be authenticated once in the same domain. In another word, when MN moves into a new MAG in the same domain, it does not need to be authenticated again, so this schema can minimize the authentication latency and packet loss. The rest of this paper is arranged as follows: the implementation of AAA server for PMIPv6 is introduced in section 2. Section 3 introduces the improved handover schema to minimize typical authentication procedures. Simulation in NS-2 and testing on test-bed and results analysis are provided in section 4 and 5 respectively. This paper is concluded in section 5. 2. IMPLEMENTATION OF AAA SERVER FOR PMIPV6[7] PMIPv6 introduces two network entities: MAG (Mobile Access Gateway) and LMA(Local Mobility Anchor). LMA is the home agent for the MN in a PMIPv6 domain. It is the topological anchor point for the MN’s home network prefix(es) and is the entity that manages the MN’s binding state. MAG is a function on an access router that manages the mobility-related signalling. It is responsible for tracking the MN’s movements to and from the access link and for signalling the MN’s local mobility anchor. In this paper, the functions of AAA server are implemented in NS2 using C++ language and TCL scripts. We add two structures that is AAA server and list of policy profile. Figure1. (a) and Figure1. (b) show the working flow chart of AAA server. After AAA server is implemented, Figure.2 shows the signal flow when MN moves from P-MAG (pre-MAG) to N-MAG (new-MAG) in the same PMIPv6 domain. Figure 1. (a) Create list of policy profile (b) Judging the legality of MN
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018 77 The whole handover procedure goes as follows: 1) P-MAG sends DeReg PBU message (including MN-HNP and Proxy-CoA) to LMA when it detects that MN is going to leave. Then LMA can release the binding between MN-HNP and Proxy-CoA of MN. 2) LMA starts the delay timer immediately when it receivs DeReg PBU message. So LMA allows N-MAG to wait for a period of time before updating the binding cache entry, and replies DeReg PBA message to P-MAG simultaneously. 3) P-MAG receives DeReg PBA message. 4) When N-MAG detects the attachment of MN, N-MAG obtains information about MN. Then MN sends RS message to N-MAG. 5) N-MAG sends QUERY message to AAA server after received RS message, then gets policy profile of MN. 6) After MN’s successful access authentication, N-MAG sends PBU message to LMA to update the LMA about the current location of MN. 7) Upon receiving the PBU message, LMA updates binding cache entry. LMA sends PBA message including MN-HNP. 8) After receiving the PBA message, N-MAG sets up a tunnel to LMA and adds a default route over tunnel to LMA. N-MAG then sends RA message to MN on the access link to advertise the MN-HNP. 9) When MN receives RA and know that there are no change on L3 interface after checking, it keeps the same IP address and uses it for packet delivery. Figure 2. Signal flow of Proxy MIPv6 based on Inter-Domain Handover
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018 78 As signal flow chart shows, the handover schemes for PMIPv6 networks includes deregistration( 1)-3) ),authentication( 4)-5) ) and registration( 6)-9) ) phases. 3. IMPROVED HANDOVER SCHEME In order to reduce the longer latency and extra cost caused by combining the AAA function while guaranteeing the handover performance, some handover procedure have been proposed as follows: in document[8], the AAA server selects the most suitable LMA based on the load information received from the LMAs. Moreover, the LMA performs admission control based on the number of current mobile nodes registered to the LMA. Document[9] proposed adaptive context transfer schemes for a fast handoff in Proxy MIPv6 which reduces the latency in AAA authentication and specifies context transfer scenarios taking into account proactive and reactive handover. When MNs attempt to handover inter/intra domain, the AAA context information stored in LMAs and MAGs will be used to support the handover without visiting the AAA server. Other documents put forward an configuration file based intra-domain handover method in PMIPv6. Optimize the intra-domain handover performance by expanding the contents of the configuration file and adding the proxy care-of address option. Of course, there are many improved schemes based on AAA server. In this section we discuss our proposed scheme to reduce the handover latency of Proxy MIPv6 which is based on intra domain. As we know, handover latency in PMIPv6 is caused due to following four latencies[10] : Link switching latency AAA authentication latency MN registration latency Latency due to Router Solicitation(RS) message and Router Advertisement(RA) message In the proposed scheme, the handover latency is reduced due to AAA authentication again in the same domain. As mentioned previously, the MAG detects the movements of MN and performs mobility-related signalling with the LMA in place of the MN. As Fig3 shows, the serving MAG(i.e.,P-MAG) will send handover initial (HI) message to the target MAG(i.e.,N-MAG) when MN is going to leave. Then N-MAG will be told the MN has been authentication. First ,N-MAG stores information (such as the AAA initiation information of MN(i.e.,MN-ID) and the address of LMA ) from HI message. Then N-MAG sends back a handover acknowledge(HACK) message to P-MAG. During this time, MN has not disconnected from P-MAG, so all the data packets are forwarded through P-MAG as before.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018 79 Figure 3. Signal flow of proposed Proxy MIPv6 based on intra-domain. P-MAG sends DeReg PBU message to LMA while detects MN is disconnect. The deregistration period is the same as mentioned previously. When N-MAG detects that MN enters or gets the Route Solicitation(RS) message from MN, it will check whether the MN’s information (including MN-ID and LMAA) have already existed. If N-MAG has MN’s information, it means that MN has been authenticated. So it is not need to registration again. Here we give some analysis about handover latency. Usually handover latency is marked by the maximum time interval between MN receives the last packet from the P-MAG and the first packet from N-MAG. Using some marks such as TDeReg (deregistration) ,TAuth (authentication), TReg(registration), TMN-MAG (MN and MAG), TMAG-LMA (MAG and LMA), TMAG- AAA(MAG and AAA) and TL2 (layer2 handover), we can get handover latency (HL) of traditional algorithm according to Fig4.1. ] HL= TDeReg +TL2 +TRS + TAuth + TReg + TRA = 4TMAG,LMA+TL2 +2TMN,MAG +2TMAG,AAA (1) The handover latency (HL) of proposed algorithm is as the following according to Figure 4 (b). HL= TDeReg +TL2 +TRS + TReg + TRA = 4TMAG,LMA+TL2+2TMN,MAG (2) Compare equation (1) and (2), you will find that the delay of AAA authentication is eliminated in our algorithm.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018 80 Figure 4. (a) Handover latency of PMIPv6 Figure 4. (b) Handover latency of proposed PMIPv6 4. SIMULATION AND ANALYSIS We have taken simulation using NS-2 and compared the performance of the proposed scheme with the previous and the ordinary one when MN moves between MAGs in the same domain. In the simulation, we assumed correspondent node(CN) sent packets to MN and MN moved form P-MAG to N-MAG , the packets from CN get to MAG through LMA and router. The simulation model is shown in Figure 5. The time in the simulation is controlled in 20 seconds. CN sent data packets at intervals of 0.05s after 1.0 second. At 14.4 second, MN moved away from P-MAG and went toward N-MAG. CN P-MAG N-MAG MN AP AP Router 100Mb,10ms 30m/s 100Mb,1ms 100Mb,1ms LMA 100Mb,1ms Figure 5. Practical simulation model
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018 81 4.1. Handover latency comparison The handover latency comparison between ordinary (marked by black) and proposed (marked by red) scheme is show in Figure 6. The abscissa represents the simulation time, the ordinate represents handover latency. Because of MN has not entered PMIPv6 network at the starting time, there are not handover latency and the delay time is 0s. The packets transfer delay is 0.05s. There are two high vertical line, the first line represents 0 5 10 15 20 -0.1 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 1.1 delay(s) time (s) delay.tr P-delay.tr Figure 6. Handover latency comparison between ordinary and proposed scheme The latency that MN enters a new Proxy MIPv6 domain and attaches to P-MAG. The graph shows, handover latency is sharp increased up to 1.02s at 1s. It is the same as the ordinary scheme. However, there are visible difference in second line. The second line represents the latency that MN enters N-MAG. The handover latency of ordinary scheme is sharp increased up to 0.5s while it is 0.45s in proposed scheme, which shows that the proposed scheme can reduce the handover latency. Table 1 shows some parameters about handover latency in the simulation. Table 1. Some parameters in the simulation Both of the start time of handover of the two scheme are 14.4s. The proposed scheme has finished handover at 14.85s, and the ordinary one has finished at 14.9s. Handover latency of the ordinary scheme =0.5s Handover latency of the proposed scheme =0.45s Obviously, the handover latency of the proposed scheme has been reduced 0.05s (0.5- 0.45=0.05s). It is decreased by 10% ((0.05/0.5)*100%=10%) according to our proposal.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018 82 4.2. Packet loss rate Figure 7 shows the number of packet loss comparison of ordinary and proposed scheme. In this simulation, ordinary scheme lost 9 packets. As while as the proposed scheme lost 8 which is less than the ordinary one. In the simulation, the largest number of data packet is 383 in two scheme by checking the simulation output trace file. So we can get table2. 0 5 10 15 20 0 1 2 3 4 5 6 7 8 9 10 lostpackets time (s) lost.tr P-lost.tr Figure 7. Number of packet loss of ordinary and proposed scheme All of the forward data packets are 383. The number of packet loss are 9 and 8 in ordinary and proposed scheme respectively. Obviously, the ratio of packet loss of our proposed scheme has been reduced 1(9-8=1). So the ratio of packet loss is decreased by 11.11% ((1/9)*100%≈11.11%) according to our proposal. To sum up, the proposed scheme is characterized by completed N-MAG authentication in advance of handover, so there is no need of authentication again. It is clear from the result of simulation, the proposed scheme reduces the handover latency and the ratio of packet loss without increased throughput. Table 2. packet loss comparison of ordinary and proposed scheme 5. TESTING ON TEST-BED 5.1. Set up test-bed For further proving, we set up a test-bed about Proxy MIPv6 according to document[11] which introduced an open source project OAI PMIPv6. Based on it we built up a real test-bed for
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018 83 wireless LAN. Furthermore, we modify the code and implement our handover algorithm. Figure 8 shows the experimental topology of our test-bed: CN P-MAG N-MAG MNAP AP Router 2001:2::2 2001:100::c646:19ff:fea1:412a 2001:100::2 (eth1) 2001:100::3 (eth1) LMA 2001:2::1 (eth0) 2001:100::1 (eth1) 2001:1::1 (eth0) 2001:1::2 (eth0) Figure 8. A real PMIPv6 test-bed [11] P-MAG, N-MAG and LMA should be configured the kernel and installed some software. Correspondent node (CN) and MN do not need any configuration. This test-bed is based on ubuntu 10.04, linux 2.6.32 kernel. The whole set-up procedures are described as follow: 1) Install the required packages including “libpcap-dev”, “indent”, “bison”, “flex”, “iproute- dev”, “libc6-dev”, “libssl-dev”, “autoconf”, “libtool”, “macchanger”, “python-netaddr”. 2) Recompile and reinstall the kernel to make some IPv6 features available. MAG and LMA need different features. 3) Install SYSLOG Server on MAGs. It can detect MN’s attachment and detachment by receiving message from access point. 4) Install FreeRadius Client in MAGs and LMA, configure file “radiusclient.conf” and server, modify the IP of FreeRadius Server and session key. 5) Install FreeRadius Server in LMA, add user authentication information in file /usr/local/etc/raddb/users, including MN-ID, home network prefix and user password. 6) Compile and install PMIP6D which is the main program of this test-bed. 7) All the computers and routers should be linked as Figure 8. 8) Configure the wireless routers so that it works as AP, insure them would not add their MAC Address to the packets that they forward. Enable and configure their SYSLOG client, make routers send “syslog” message to corresponding MAGs. 9) Start the program by using well-configured “python” script after all installation above. We test the proposed scheme’s handover latency in our test-bed and compare with the traditional scheme. Since the L2 layer accessing takes a long time (scale in seconds), which is much larger than the L3 layer handover latency (scale in milliseconds), using the traditional latency definition is not easy to see the improvement. Therefore, we adopt a new definition which make the printing output “pmip_mag_recv_rs: Router Solicitation received” as the beginning of handover, which means N-MAG just detects MN’s attachment. And we make the output “mag_end_registration: Out of setup route” as the end of the handover, which means N-MAG has completed signalling exchange with LMA, built tunnel and sent RA message to MN. We have tested the traditional handover scheme and proposed scheme 100 times each, including 50 times switch to P-MAG from N-MAG and 50 times switch to N-MAG from P-MAG. Test data are shown in Figure 9:
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018 84 Figure 9. Handover latency of the traditional and proposed scheme The average of test data is shown in table 3. Table 3. Test data average These data show that, due to the cancellation of the unnecessary AAA authentication, handover latency in proposed scheme has been decreased 12.62%. Thus, the improved scheme is superior to the traditional one. 6. CONCLUSIONS In this paper, we introduce the present development of PMIPv6 and the way to add AAA server to PMIPv6 in NS-2. What’s more, we have proposed an improved handover scheme which can minimize handover latency and ratio of packet loss by omitting operation of AAA authentication again in the same domain. We evaluate the performance of both the ordinary and the proposed scheme in NS-2 and a real test-bed. The simulation and testing results show that our proposed scheme can effectively reduce the handover latency and ratio of packet loss. However, there are some drawbacks, for example, it is only satiable for intra-domain handover, the security issues is not perfect etc. Further work should include the improvement and simulation jobs aimed at the problems above.
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.3, May 2018 85 ACKNOWLEDGEMENTS This study is supported by National Natural Science Foundation of China (No. 61070179), Guangzhou Science & Technology Project (No.2014J4100019), Key Collaborative Innovation Project among Industry, University and Institute of Guangzhou(No. 201604010001). REFERENCES [1] S. Gundavelli (Ed.), K. Leung, V. Devarapalli, K. Chowdhury and B. Patil, 'Proxy Mobile IPv6', Internet Engineering Task Force RFC 5213, August 2008. [2] J. Korhonen, Ed.Diameter Support for Proxy Mobile IPv6[S].IETF RFC 5779,2010. [3] LV Jianhua, ZHOU Huachun, QIU Luwei,et al. Implementation of authentication and authorization of proxy mobile IPv6. Computer Engineering and Application, 2012,48(22):109-116. [4] Ju Eun Kang, Dong Won Kun, Yang Li, You Ze Cho. Seamless Handover Scheme for Proxy Mobile IPv6[J]. IEEE Computer Society, 2008,10.1109/WiMob:410-414. [5] Igor Kim, Young Chul Jung, Yong Tak Kim. Low Latency Proactive Handover Scheme for Proxy MIPv6 with MIN[J],SpringerLink, 2008, Volume 5297:344-353. [6] Linoh A.Magagula, Olabisi E.Falowo, H.Anthony Chan.Handover Optimization in Heterogeneous Wireless Networks: PMIPv6 vs. PMIPv6 with MIH [C] .Southern Africa Telecommunication Networks and Applications Conference, 2009. [7] Nitesh M. Tarbani, B.R. Chandavarkar. Implementation of AAA Server for PMIPv6 in NS-2[J]. PDCTA,2011. IEEE, 2011. [8] Viswanathan M, Yi M K, Yun S Y, et al. A novel local mobility anchor selection scheme for proxy mobile IPv6 networks[C], Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication. ACM, 2012: 49. [9] Baek J J, Song J S. Adaptive context transfer scheme for fast handoff in Proxy Mobile IPv6[C], Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST'08. The Second International Conference on. IEEE, 2008: 127-130. [10] Banerjee K, Tahasin Z I, Uddin R. An Efficient Handover Scheme for PMIPv6 in IEEE 802.16/WiMAX Network[J]. International Journal of Electrical & Computer Sciences, 2011, 11(5) [11] Giuliana Iapichino, Christian Bonnet. Experimental Evaluation of Proxy Mobile IPv6: an Implementation Perspective [J]. IEEE Wireless Communications and Networking Conference (WCNC), 2010 IEEE, April 2010 AUTHORS Hewei Yu Professor of South China University of Technology. His research interests focus on integration technology of heterogeneous wireless networks. He directed several projects supported by the National Natural Science Foundation of China, Science & Technology projects of Guangdong Province, and Guangzhou City. Meiling Zhou Got her Master degree from South China University of Technology. Her research direction is handoff technology of Proxy Mobile IPv6. Now she is working in the GF Fund Management Co., Ltd.