On predictive routing of security contexts in an all-IP network
dc.contributor.author | Kim, Hahnsang | en_US |
dc.contributor.author | Shin, Kang G. | en_US |
dc.date.accessioned | 2010-03-01T20:21:28Z | |
dc.date.available | 2011-02-01T20:36:36Z | en_US |
dc.date.issued | 2010-01 | en_US |
dc.identifier.citation | Kim, Hahnsang; Shin, Kang G. (2010). "On predictive routing of security contexts in an all-IP network." Security and Communication Networks 3(1): 4-15. <http://hdl.handle.net/2027.42/65037> | en_US |
dc.identifier.issn | 1939-0114 | en_US |
dc.identifier.issn | 1939-0122 | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/65037 | |
dc.description.abstract | While mobile nodes (MNs) undergo handovers across inter-wireless access networks, their security contexts must be propagated for secure re-establishment of on-going application sessions, such as those in secure mobile internet protocol (IP), authentication, authorization, and accounting (AAA) services. Routing security contexts via an IP network either on-demand or based on MNs' mobility prediction, imposes new challenging requirements of secure cross-handover services and security context management. In this paper, we present a context router (CXR) that manages security contexts in an all-IP network, providing seamless and secure handover services for the mobile users that carry multimedia-access devices. A CXR is responsible for (1) monitoring of MNs' cross-handover, (2) analysis of MNs' movement patterns, and (3) routing of security contexts ahead of MNs' arrival at relevant access points. The predictive routing reduces the delay in the underlying security association that would otherwise fetch an involved security context from a remote server. The predictive routing of security contexts is performed based on statistical learning of MNs' movement pattern, gauging (dis)similarities between the patterns obtained via distance measurements. The CXR has been evaluated with a prototypical implementation based on an MN mobility model on a grid. Our evaluation results support the predictive routing mechanism's improvement in seamless and secure cross-handover services by a factor of 2.5. Also, the prediction mechanism is shown to outperform the Kalman filter-based method [13] as a Kalman Fiter-based mechanism up to 1.5 and 3.6 times regarding prediction accuracy and computation performance, respectively. Copyright © 2009 John Wiley & Sons, Ltd. | en_US |
dc.format.extent | 509450 bytes | |
dc.format.extent | 3118 bytes | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | text/plain | |
dc.publisher | John Wiley & Sons, Ltd. | en_US |
dc.subject.other | Engineering | en_US |
dc.subject.other | Electronic, Electrical & Telecommunications Engineering | en_US |
dc.title | On predictive routing of security contexts in an all-IP network | en_US |
dc.type | Article | en_US |
dc.rights.robots | IndexNoFollow | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.description.peerreviewed | Peer Reviewed | en_US |
dc.contributor.affiliationum | Real-Time Computing Laboratory, Department of Electrical Engineering and Computer Science, The University of Michigan, Ann Arbor, MI 48109-2121, U.S.A. ; Department of Electrical Engineering and Computer Science, The University of Michigan, Ann Arbor, MI 48109-2121, U.S.A. | en_US |
dc.contributor.affiliationum | Real-Time Computing Laboratory, Department of Electrical Engineering and Computer Science, The University of Michigan, Ann Arbor, MI 48109-2121, U.S.A. | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/65037/1/135_ftp.pdf | |
dc.identifier.doi | 10.1002/sec.135 | en_US |
dc.identifier.source | Security and Communication Networks | en_US |
dc.owningcollname | Interdisciplinary and Peer-Reviewed |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.