Enabling Mobile Networks through secure naming

Devan Rehunathan, R. Atkinson, S. Bhatti
{"title":"Enabling Mobile Networks through secure naming","authors":"Devan Rehunathan, R. Atkinson, S. Bhatti","doi":"10.1109/MILCOM.2009.5379843","DOIUrl":null,"url":null,"abstract":"Mobile Networks are increasingly important in land-, sea-and air-based military scenarios. The interest in supporting network mobility for Internet Protocol (IP) networks has led to the Network Mobility (NEMO) protocol extensions being proposed for IP within the IETF. These extensions are based on the work already completed on host mobility for Mobile IP (MIP). The current work is based on the use of software agents: a Home Agent (HA) intercepts packets destined for the addresses in the mobile network and uses an IP-in-IP tunnel to send the packets to the Mobile Router (MR) located at a Care of Address (CoA), which terminates the tunnel. As the mobile network moves to new IP networks, the MR updates the HA with its new CoA. While this tunnelling approach represents a sound engineering solution for backwards compatibility, and is the only one that has been pursued within the IETF, it has seen little deployment, either in support of mobile hosts or mobile networks. We make the case for an alternative approach based on secure naming. We make a comparison in operation with the current tunnelling-based approach, both in architecture and by analysis of protocol operation. Our initial analyses indicate that a naming-based approach shows promise as a viable alternative to a tunnelling-based approach, and could offer other architectural benefits.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2009 - 2009 IEEE Military Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2009.5379843","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

Abstract

Mobile Networks are increasingly important in land-, sea-and air-based military scenarios. The interest in supporting network mobility for Internet Protocol (IP) networks has led to the Network Mobility (NEMO) protocol extensions being proposed for IP within the IETF. These extensions are based on the work already completed on host mobility for Mobile IP (MIP). The current work is based on the use of software agents: a Home Agent (HA) intercepts packets destined for the addresses in the mobile network and uses an IP-in-IP tunnel to send the packets to the Mobile Router (MR) located at a Care of Address (CoA), which terminates the tunnel. As the mobile network moves to new IP networks, the MR updates the HA with its new CoA. While this tunnelling approach represents a sound engineering solution for backwards compatibility, and is the only one that has been pursued within the IETF, it has seen little deployment, either in support of mobile hosts or mobile networks. We make the case for an alternative approach based on secure naming. We make a comparison in operation with the current tunnelling-based approach, both in architecture and by analysis of protocol operation. Our initial analyses indicate that a naming-based approach shows promise as a viable alternative to a tunnelling-based approach, and could offer other architectural benefits.
通过安全命名启用移动网络
移动网络在陆基、海基和空基军事场景中越来越重要。对支持互联网协议(IP)网络的网络移动性的兴趣导致了IETF为IP提出了网络移动性(NEMO)协议扩展。这些扩展是基于已经完成的针对移动IP (MIP)的主机移动性的工作。目前的工作是基于软件代理的使用:一个Home Agent (HA)拦截发往移动网络中的地址的数据包,并使用IP-in-IP隧道将数据包发送到位于地址保护(CoA)的移动路由器(MR),后者终止隧道。当移动网络迁移到新的IP网络时,MR会用新的CoA更新HA。虽然这种隧道方法代表了向后兼容性的可靠工程解决方案,并且是IETF内部唯一追求的解决方案,但在支持移动主机或移动网络方面,它几乎没有得到部署。我们提出了一种基于安全命名的替代方法。从架构和协议运行分析两方面对现有的基于隧道的方法进行了操作比较。我们的初步分析表明,基于命名的方法有望成为基于隧道的方法的可行替代方案,并且可以提供其他架构优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信