Back close

Artificial Intelligence and Evolutionary Computations in Engineering Systems: Proceedings of ICAIECES 2015

Publication Type : Book Chapter

Thematic Areas : Wireless Network and Application

Publisher : Springer India, New Delhi.

Source : Springer India, New Delhi, p.193–207 (2016)

Url : http://dx.doi.org/10.1007/978-81-322-2656-7_18

ISBN : 9788132226567

Keywords : Mobile IP Proxy Care-of-Address Mobile access gateway Local mobility anchor Distributed mobility management Token Routing table update Proxy binding update Proxy binding query

Campus : Coimbatore

School : School of Engineering

Center : Amrita Center for Wireless Networks and Applications (AmritaWNA), Electronics Communication and Instrumentation Forum (ECIF)

Department : Computer Science, Electronics and Communication, Wireless Networks and Applications (AWNA)

Year : 2016

Abstract : At present, the users are apparently high for wireless networks. In proxy mobile IPv6, the mobility management among the networks is tedious for the location update of mobile node and the secrecy plays a tremendous role. Here, the messages are exchanged via a localized mobility anchor between the communicants. Consequently, the data traffic is high due to the centralized feature of local mobility anchor. Also there is a single point of failure and increase in the network cost. Therefore, the efficacy of the network is increased by distributing the functionality of local mobility anchor among the mobile access gateways present in the network. However, there are several security challenges such as denial-of-service, man-in-the-middle attack, etc. Thus, the network needs an enhancement for prevention of threat and location update of mobile node. Hence, the presented paper proposes a new tokenized binding update scheme by sharing a routing table. Here, the token of mobile node is incorporated in the routing table and shared among the mobile access gateways. In addition, the proposed scheme decreases the cost of signaling and traffic overhead by eliminating unnecessary queries for binding update and acknowledgment. The security of the scheme is validated using AVISPA—the model checker. From the security and numerical analyses, the proposed scheme shows the enhancement of security and significant reduction in the connection cost and data delivery cost when compared to the existing schemes.

Cite this Research Publication : P. N. Anbarasi and M, Skumar, “Artificial Intelligence and Evolutionary Computations in Engineering Systems: Proceedings of ICAIECES 2015”, S. Subhransu Dash, Bhaskar, A. M., Panigrahi, K. Bijaya, and Das, S., Eds. New Delhi: Springer India, 2016, pp. 193–207.

Admissions Apply Now