Publication Type : Book Chapter
Thematic Areas : Wireless Network and Application
Publisher : Springer India, New Delhi.
Source : Springer India, New Delhi, p.193–207 (2016)
Url : http://dx.doi.org/10.1007/978-81-322-2656-7_18
ISBN : 9788132226567
Keywords : Mobile IP Proxy Care-of-Address Mobile access gateway Local mobility anchor Distributed mobility management Token Routing table update Proxy binding update Proxy binding query
Campus : Coimbatore
School : School of Engineering
Center : Amrita Center for Wireless Networks and Applications (AmritaWNA), Electronics Communication and Instrumentation Forum (ECIF)
Department : Computer Science, Electronics and Communication, Wireless Networks and Applications (AWNA)
Year : 2016
Abstract : At present, the users are apparently high for wireless networks. In proxy mobile IPv6, the mobility management among the networks is tedious for the location update of mobile node and the secrecy plays a tremendous role. Here, the messages are exchanged via a localized mobility anchor between the communicants. Consequently, the data traffic is high due to the centralized feature of local mobility anchor. Also there is a single point of failure and increase in the network cost. Therefore, the efficacy of the network is increased by distributing the functionality of local mobility anchor among the mobile access gateways present in the network. However, there are several security challenges such as denial-of-service, man-in-the-middle attack, etc. Thus, the network needs an enhancement for prevention of threat and location update of mobile node. Hence, the presented paper proposes a new tokenized binding update scheme by sharing a routing table. Here, the token of mobile node is incorporated in the routing table and shared among the mobile access gateways. In addition, the proposed scheme decreases the cost of signaling and traffic overhead by eliminating unnecessary queries for binding update and acknowledgment. The security of the scheme is validated using AVISPA—the model checker. From the security and numerical analyses, the proposed scheme shows the enhancement of security and significant reduction in the connection cost and data delivery cost when compared to the existing schemes.
Cite this Research Publication : P. N. Anbarasi and M, Skumar, “Artificial Intelligence and Evolutionary Computations in Engineering Systems: Proceedings of ICAIECES 2015”, S. Subhransu Dash, Bhaskar, A. M., Panigrahi, K. Bijaya, and Das, S., Eds. New Delhi: Springer India, 2016, pp. 193–207.