ENABLING MOBILE NETWORKS THROUGH SECURE NAMING

Devan Rehunathan, Randall Atkinson, Saleem Bhatti

Research output: Contribution to journalArticlepeer-review

Abstract

Mobile Networks are increasingly important in land-, sea- and air-based military scenarios. The interest in supporting network mobility for Internet Protocol (IP) networks has led to the Network Mobility (NEMO) protocol extensions being proposed for JP within the IETE These extensions are based on the work already completed on host mobility for Mobile IP (MIP). The current work is based on the use of software agents: a Home Agent (HA) intercepts packets destined for the addresses in the mobile network and uses an IP-in-IP tunnel to send the packets to the Mobile Router (MR) located at a Care of Address (CoA), which terminates the tunnel. As the mobile network moves to new IP networks, the MR updates the HA with its new CoA. While this tunnelling approach represents a sound engineering solution for backwards compatibility, and is the only one that has been pursued within the IETF, it has seen little deployment, either in support of mobile hosts or mobile networks. We make the case for an alternative approach based on secure naming. We make a comparison in operation with the current tunnelling-based approach, both in architecture and by analysis of protocol operation. Our initial analyses indicate that a naming-based approach shows promise as a viable alternative to a tunnelling-based approach, and could offer other architectural benefits.

Original languageEnglish
Pages (from-to)2153-2160
Number of pages8
JournalMILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4
Publication statusPublished - 2009

Keywords

  • PERFORMANCE

Fingerprint

Dive into the research topics of 'ENABLING MOBILE NETWORKS THROUGH SECURE NAMING'. Together they form a unique fingerprint.

Cite this