Abstract-Proxy Mobile IPv6 (PMIPv6) is a network-based mobility support protocol and it does not require Mobile Nodes (MNs) to be involved in the mobility support signaling. In the case when multiple interfaces are active in an MN simultaneously, each data flow can be dynamically allocated to and redirected between different access networks to adapt to the dynamically changing network status and to balance the workload. Such a flow redistribution control is called "flow mobility". In the existing PMIPv6-based flow mobility support, although the MN's logical interface can solve the well-known problems of flow mobility in a heterogeneous network, some missing procedures, such as an MN-derived flow handover, make PMIPv6-based flow mobility incomplete. In this paper, an enhanced flow mobility support is proposed for actualizing the flow mobility support in PMIPv6. The proposed scheme is also based on the MN's logical interface, which hides the physical interfaces from the network layer and above. As new functional modules, the flow interface manager is placed at the MN's logical interface and the flow binding manager in the Local Mobility Anchor (LMA) is paired with the MN's flow interface manager. They manage the flow bindings, and select the proper access technology to send packets. In this paper, we provide the complete flow mobility procedures which begin with the following three different triggering cases: the MN's new connection/disconnection, the LMA's decision, and the MN's request. Simulation using the ns-3 network simulator is performed to verify the proposed procedures and we show the network throughput variation caused by the network offload using the proposed procedures.
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.
With the exponential growth of Cyber-Physical Systems (CPSs) technologies, the Internet of Things (IoT) infrastructure has evolved from built-in static infrastructure to a flexible structure applicable to various mobile environments. In this Internet of Mobile Things (IoMT) environment, each IoT device could operate simultaneously as a provider and consumer of information, and could provide new services through the exchange of such information. Named Data Networking (NDN), which could request data by content name rather than location (IP address), is suitable for such mobile IoT environments. However, in the current Named Data Networking (NDN) specification, producer mobility is one of the major problems in need of remedy. Previously proposed schemes for producer mobility use an anchor to hide the producer’s movement from consumers. As a result, they require a special anchor node and a signaling procedure to track the current locations of contents. A few anchorless schemes have also been proposed, but they still require mobility signaling and all NDN routers on the signaling path must understand the meaning of the signaling. We therefore propose an anchorless producer mobility scheme for the NDN. This scheme uses a dual-connectivity strategy that can be expressed as a soft handover. Whenever a producer changes its NDN Access Router (NAR), the new mobility link service located on the mobile producer’s old NDN face repairs the old link so that the connectivity with the pNAR can be maintained for a while. The old NDN face is removed after the new location information on the contents of the producer is disseminated over the NDN network by the Named-data Link State Routing Protocol (NLSR) routing protocol at the nNAR. The new mobility link service decouples connection and transaction to hide the collapse of the link. Therefore, the NDN’s mobility procedure could be simplified as the handover is defined as transaction completion as opposed to a breakdown of links. The proposed scheme prevents the routing information from being abruptly outdated due to producer mobility. Our simulation results show seamless handover when the producer changes its default access router.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.