Show simple item record

On predictive routing of security contexts in an all-IP network

dc.contributor.authorKim, Hahnsangen_US
dc.contributor.authorShin, Kang G.en_US
dc.date.accessioned2010-03-01T20:21:28Z
dc.date.available2011-02-01T20:36:36Zen_US
dc.date.issued2010-01en_US
dc.identifier.citationKim, Hahnsang; Shin, Kang G. (2010). "On predictive routing of security contexts in an all-IP network." Security and Communication Networks 3(1): 4-15. <http://hdl.handle.net/2027.42/65037>en_US
dc.identifier.issn1939-0114en_US
dc.identifier.issn1939-0122en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/65037
dc.description.abstractWhile mobile nodes (MNs) undergo handovers across inter-wireless access networks, their security contexts must be propagated for secure re-establishment of on-going application sessions, such as those in secure mobile internet protocol (IP), authentication, authorization, and accounting (AAA) services. Routing security contexts via an IP network either on-demand or based on MNs' mobility prediction, imposes new challenging requirements of secure cross-handover services and security context management. In this paper, we present a context router (CXR) that manages security contexts in an all-IP network, providing seamless and secure handover services for the mobile users that carry multimedia-access devices. A CXR is responsible for (1) monitoring of MNs' cross-handover, (2) analysis of MNs' movement patterns, and (3) routing of security contexts ahead of MNs' arrival at relevant access points. The predictive routing reduces the delay in the underlying security association that would otherwise fetch an involved security context from a remote server. The predictive routing of security contexts is performed based on statistical learning of MNs' movement pattern, gauging (dis)similarities between the patterns obtained via distance measurements. The CXR has been evaluated with a prototypical implementation based on an MN mobility model on a grid. Our evaluation results support the predictive routing mechanism's improvement in seamless and secure cross-handover services by a factor of 2.5. Also, the prediction mechanism is shown to outperform the Kalman filter-based method [13] as a Kalman Fiter-based mechanism up to 1.5 and 3.6 times regarding prediction accuracy and computation performance, respectively. Copyright © 2009 John Wiley & Sons, Ltd.en_US
dc.format.extent509450 bytes
dc.format.extent3118 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypetext/plain
dc.publisherJohn Wiley & Sons, Ltd.en_US
dc.subject.otherEngineeringen_US
dc.subject.otherElectronic, Electrical & Telecommunications Engineeringen_US
dc.titleOn predictive routing of security contexts in an all-IP networken_US
dc.typeArticleen_US
dc.rights.robotsIndexNoFollowen_US
dc.subject.hlbsecondlevelComputer Scienceen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.description.peerreviewedPeer Revieweden_US
dc.contributor.affiliationumReal-Time Computing Laboratory, Department of Electrical Engineering and Computer Science, The University of Michigan, Ann Arbor, MI 48109-2121, U.S.A. ; Department of Electrical Engineering and Computer Science, The University of Michigan, Ann Arbor, MI 48109-2121, U.S.A.en_US
dc.contributor.affiliationumReal-Time Computing Laboratory, Department of Electrical Engineering and Computer Science, The University of Michigan, Ann Arbor, MI 48109-2121, U.S.A.en_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/65037/1/135_ftp.pdf
dc.identifier.doi10.1002/sec.135en_US
dc.identifier.sourceSecurity and Communication Networksen_US
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.