SlideShare a Scribd company logo
Natarajan Meghanathan et al. (Eds) : CCSEA, NCOM, AIFU, DKMP, EMSA, SIPRO, SEA - 2018
pp. 165– 173, 2018. © CS & IT-CSCP 2018 DOI : 10.5121/csit.2018.80314
IMPROVED HANDOVER ALGORITHM FOR
PROXY MIPv6 BASED ON AAA SERVER
Hewei Yu1
and Meiling Zhou2
1
School of Computer Science & Engineering, South China University of
Technology, Guang Zhou, P.R.China
2
GF Fund Management Co. Ltd., Guang Zhou, P.R.China
ABSTRACT
This paper proposes an improved handover algorithm which does not need authenticating again
if Mobile Node moves within the same Proxy MIPv6 domain. When MN enters PMIPv6 domain
at the first time, it needs to make an AAA authentication. But when MN moves between MAGs in
the same domain, it can perform handover procedure without the second times of AAA
authentication, and speed the handover process. We built a structure of PMIPv6 including AAA
server on NS-2, and proposed an improved handover algorithm for PMIPv6 based on AAA
authentication. The simulation results show that the new scheme can effectively reduce the
handover latency and ratio of packet loss, and improve network performance.
KEYWORDS
PMIPv6; AAA; handover; fast handover
1. INTRODUCTION
Nowadays, the huge commercial demand for mobile Internet has brought new opportunity and
challenge of technology. In 2008, the Internet Engineering Task Force (IETF) proposed a
network-based mobility management protocol called Proxy MIPv6[1]
. Because of the bright
prospect of PMIPv6, researchers all over the world have carried out extensive and in-depth study
on PMIPv6, and provides various effective handoff scheme. As a whole, the research on PMIPv6
has many aspects, including security, handover performance etc. On the security mechanism of
PMIPv6, RFC5779[2]
defined AAA for authentication ,authorization and accounting.
Document[3] designed and implemented the authentication and authorization of PMIPv6 network
system, the testing results proved the validity and feasibility of the certification system. On the
handover performance of PMIPv6, document[4] proposed a seamless handover scheme using the
neighbor discovery message of IPv6 to reduce the handover latency and packet buffering at the
Mobile Access Gateway (MAG) to avoid the on-the-fly packet loss during a handover for
PMIPv6. However, it is unable to satisfy the real-time demand of higher business communication.
Document[5] proposes a novel low latency handover scheme for PMIPv6 using Media
Independent Handover (MIH) services. Document[6] tested the handover performance of PMIPv6
with and without the IEEE 802.21 MIH services in a heterogeneous wireless networks’
environment. The results showed that the handover performance had improved if the IEEE 802.21
MIH services is used, while there have some problem such as Signal overload. Of course, A
scheme to Reduce Packet Loss during PMIPv6 Handover is called PL-PMIPv6, which is similar
to the fast handover for MIPv6, and FH-PMIPv6 was improved based on it .
166 Computer Science & Information Technology (CS & IT)
In the PMIPv6 system include AAA severs, when MN enters PMIPv6 domain at the first time, it
is required to be authenticated. This paper proposes a scheme, MN only need to be authenticated
once in the same domain. In another word, when MN moves into a new MAG in the same
domain, it does not need to be authenticated again, so this schema can minimize the
authentication latency and packet loss.
The rest of this paper is arranged as follows: the implementation of AAA server for PMIPv6 is
introduced in section 2. Section 3 introduces the improved handover schema to minimize typical
authentication procedures. Simulation and results analysis are provided in section 4. This paper is
concluded in section 5.
2. IMPLEMENTATION OF AAA SERVER FOR PMIPV6 [7]
PMIPv6 introduces two network entities: MAG (Mobile Access Gateway) and LMA(Local
Mobility Anchor). LMA is the home agent for the MN in a PMIPv6 domain. It is the topological
anchor point for the MN’s home network prefix(es) and is the entity that manages the MN’s
binding state. MAG is a function on an access router that manages the mobility-related signalling.
It is responsible for tracking the MN’s movements to and from the access link and for signalling
the MN’s local mobility anchor.
In this paper, the functions of AAA server are implemented in NS2 using C++ language and TCL
scripts. We add two structures that is AAA server and list of policy profile. Figure1. (a) and
Figure1. (b) show the working flow chart of AAA server.
After AAA server is implemented, Figure.2 shows the signal flow when MN moves from P-
MAG(pre-MAG) to N-MAG (new-MAG) in the same PMIPv6 domain.
Figure 1. (a) Create list of policy profile (b) Judging the legality of MN
The whole handover procedure goes as follows:
1) P-MAG sends DeReg PBU message (including MN-HNP and Proxy-CoA) to LMA when it
detects that MN is going to leave. Then LMA can release the binding between MN-HNP and
Proxy-CoA of MN.
2) LMA starts the delay timer immediately when it receivs DeReg PBU message. So LMA allows
N-MAG to wait for a period of time before updating the binding cache entry, and replies DeReg
Computer Science & Information Technology (CS & IT) 167
PBA message to P-MAG simultaneously.
3) P-MAG receives DeReg PBA message.
4) When N-MAG detects the attachment of MN, N-MAG obtains information about MN. Then
MN sends RS message to N-MAG.
5) N-MAG sends QUERY message to AAA server after received RS message, then gets policy
profile of MN.
6) After MN’s successful access authentication, N-MAG sends PBU message to LMA to update
the LMA about the current location of MN.
7) Upon receiving the PBU message, LMA updates binding cache entry. LMA sends PBA
message including MN-HNP.
8) After receiving the PBA message, N-MAG sets up a tunnel to LMA and adds a default route
over tunnel to LMA. N-MAG then sends RA message to MN on the access link to advertise the
MN-HNP.
9) When MN receives RA and know that there are no change on L3 interface after checking, it
keeps the same IP address and uses it for packet delivery.
Figure 2. Signal flow of Proxy MIPv6 based on Inter-Domain Handover
168 Computer Science & Information Technology (CS & IT)
As signal flow chart shows, the handover schemes for PMIPv6 networks includes deregistration
( 1)-3) ),authentication( 4)-5) ) and registration( 6)-9) ) phases.
3. IMPROVED HANDOVER SCHEME
In order to reduce the longer latency and extra cost caused by combining the AAA function while
guaranteeing the handover performance, some handover procedure have been proposed as
follows: in document[8], the AAA server selects the most suitable LMA based on the load
information received from the LMAs. Moreover, the LMA performs admission control based on
the number of current mobile nodes registered to the LMA. Document[9] proposed adaptive
context transfer schemes for a fast handoff in Proxy MIPv6 which reduces the latency in AAA
authentication and specifies context transfer scenarios taking into account proactive and reactive
handover. When MNs attempt to handover inter/intra domain, the AAA context information
stored in LMAs and MAGs will be used to support the handover without visiting the AAA server.
Other documents put forward an configuration file based intra-domain handover method in
PMIPv6. Optimize the intra-domain handover performance by expanding the contents of the
configuration file and adding the proxy care-of address option. Of course, there are many
improved schemes based on AAA server. In this section we discuss our proposed scheme to
reduce the handover latency of Proxy MIPv6 which is based on intra domain.
As we know, handover latency in PMIPv6 is caused due to following four latencies[10]
:
Link switching latency
AAA authentication latency
MN registration latency
Latency due to Router Solicitation(RS) message and Router Advertisement(RA) message
In the proposed scheme, the handover latency is reduced due to AAA authentication again in the
same domain.
As mentioned previously, the MAG detects the movements of MN and performs mobility-related
signalling with the LMA in place of the MN. As Fig3 shows, the serving MAG(i.e.,P-MAG) will
send handover initial (HI) message to the target MAG(i.e.,N-MAG) when MN is going to leave.
Then N-MAG will be told the MN has been authentication. First ,N-MAG stores information
(such as the AAA initiation information of MN(i.e.,MN-ID) and the address of LMA ) from HI
message. Then N-MAG sends back a handover acknowledge(HACK) message to P-MAG.
During this time, MN has not disconnected from P-MAG, so all the data packets are forwarded
through P-MAG as before.
P-MAG sends DeReg PBU message to LMA while detects MN is disconnect. The deregistration
period is the same as mentioned previously.
When N-MAG detects that MN enters or gets the Route Solicitation(RS) message from MN, it
will check whether the MN’s information (including MN-ID and LMAA) have already existed. If
N-MAG has MN’s information, it means that MN has been authenticated. So it is not need to
registration again. Here we give some analysis about handover latency. Usually handover latency
is marked by the maximum time interval between MN receives the last packet from the P-MAG
and the first packet from N-MAG. Using some marks such as TDeReg (deregistration) ,TAuth
(authentication), TReg(registration), TMN-MAG (MN and MAG), TMAG-LMA (MAG and LMA), TMAG-
Computer Science & Information Technology (CS & IT) 169
AAA(MAG and AAA) and TL2 (layer2 handover), we can get handover latency (HL) of traditional
algorithm according to Fig4.1.
Figure 3. Signal flow of proposed Proxy MIPv6 based on intra-domain.
HL= TDeReg +TL2 +TRS + TAuth + TReg + TRA
= 4TMAG,LMA+TL2 +2TMN,MAG +2TMAG,AAA (1)
The handover latency (HL) of proposed algorithm is as the following according to Figure 4 (b).
HL= TDeReg +TL2 +TRS + TReg + TRA
= 4TMAG,LMA+TL2+2TMN,MAG (2)
Compare equation (1) and (2), you will find that the delay of AAA authentication is eliminated in
our algorithm.
170 Computer Science & Information Technology (CS & IT)
Figure 4. (a) Handover latency of PMIPv6
Figure 4. (b) Handover latency of proposed PMIPv6
4. SIMULATION AND ANALYSIS
We have taken simulation using NS-2 and compared the performance of the proposed scheme
with the previous and the ordinary one when MN moves between MAGs in the same domain. In
the simulation, we assumed correspondent node(CN) sent packets to MN and MN moved form
P-MAG to N-MAG , the packets from CN get to MAG through LMA and router. The simulation
model is shown in Figure 5. The time in the simulation is controlled in 20 seconds. CN sent data
packets at intervals of 0.05s after 1.0 second. At 14.4 second, MN moved away from P-MAG and
went toward N-MAG.
Figure 5. Practical simulation model
Computer Science & Information Technology (CS & IT) 171
2.1. Handover latency comparison
The handover latency comparison between ordinary (marked by black) and proposed (marked by
red) scheme is show in Fig6. The abscissa represents the simulation time, the ordinate represents
handover latency. Because of MN has not entered PMIPv6 network at the starting time, there are
not handover latency and the delay time is 0s. The packets transfer delay is 0.05s. There are two
high vertical line, the first line represents the latency that MN enters a new Proxy MIPv6 domain
and attaches to P-MAG. The graph shows, handover latency is sharp increased up to 1.02s at 1s.
It is the same as the ordinary scheme. However, there are visible difference in second line. The
second line represents the latency that MN enters N-MAG. The handover latency of ordinary
scheme is sharp increased up to 0.5s while it is 0.45s in proposed scheme, which shows that the
proposed scheme can reduce the handover latency.
Figure 6. Handover latency comparison between ordinary and proposed scheme
Table 1 shows some parameters about handover latency in the simulation.
Table 1. Some parameters in the simulation
Scheme Start time of
handover(s)
Finish time of
handover(s)
Handover
latency(s)
Previous scheme 14.4 14.9 0.5
Proposed scheme 14.4 14.85 0.45
Both of the start time of handover of the two scheme are 14.4s. The proposed scheme has finished
handover at 14.85s, and the ordinary one has finished at 14.9s.
Handover latency of the ordinary scheme =0.5s
Handover latency of the proposed scheme =0.45s
Obviously, the handover latency of the proposed scheme has been reduced 0.05s (0.5-
0.45=0.05s). It is decreased by 10% ((0.05/0.5)*100%=10%) according to our proposal.
2.2. Packet loss rate
Figure 7 shows the number of packet loss comparison of ordinary and proposed scheme. In this
simulation , ordinary scheme lost 9 packets. As while as the proposed scheme lost 8 which is less
than the ordinary one.
172 Computer Science & Information Technology (CS & IT)
In the simulation, the largest number of data packet is 383 in two scheme by checking the
simulation output trace file. So we can get table2.
Figure 7. Number of packet loss of ordinary and proposed scheme
All of the forward data packets are 383.
The number of packet loss are 9 and 8 in ordinary and proposed scheme respectively.
Obviously, the ratio of packet loss of our proposed scheme has been reduced 1(9-8=1). So the
ratio of packet loss is decreased by 11.11% ((1/9)*100%≈11.11%) according to our proposal.
To sum up, the proposed scheme is characterized by completed N-MAG authentication in
advance of handover, so there is no need of authentication again. It is clear from the result of
simulation, the proposed scheme reduces the handover latency and the ratio of packet loss without
increased throughput.
Table 2. packet loss comparison of ordinary and proposed scheme
Scheme The number of loss The number of forward Packet loss ratio
Previous scheme 9 383 ≈2.35%
Proposed scheme 8 383 ≈2.09%
5. CONCLUSIONS
In this paper, we introduce the present development of PMIPv6 and the way to add AAA server
to PMIPv6 in NS-2. What’s more, we have proposed an improved handover scheme which can
minimize handover latency and ratio of packet loss by omitting operation of AAA authentication
again in the same domain. We evaluate the performance of both the ordinary and the proposed
scheme in NS-2 using a PMIPv6 system model. The simulation results show that our proposed
scheme can effectively reduce the handover latency and ratio of packet loss. However, there are
some drawbacks, for example, it is only satiable for intra-domain handover, the security issues is
not perfect etc. Further work should include the improvement and simulation jobs aimed at the
problems above.
ACKNOWLEDGEMENTS
This study is supported by National Natural Science Foundation of China (No. 61070179),
Guangzhou Science & Technology Project (No.2014J4100019), Key Collaborative Innovation
Project among Industry, University and Institute of Guangzhou(No. 201604010001).
Computer Science & Information Technology (CS & IT) 173
REFERENCES
[1] S. Gundavelli (Ed.), K. Leung, V. Devarapalli, K. Chowdhury and B. Patil, 'Proxy Mobile IPv6',
Internet Engineering Task Force RFC 5213, August 2008.
[2] J. Korhonen, Ed.Diameter Support for Proxy Mobile IPv6[S].IETF RFC 5779,2010.
[3] LV Jianhua, ZHOU Huachun, QIU Luwei,et al. Implementation of authentication and authorization of
proxy mobile IPv6. Computer Engineering and Application, 2012,48(22):109-116.
[4] Ju Eun Kang, Dong Won Kun, Yang Li, You Ze Cho. Seamless Handover Scheme for Proxy Mobile
IPv6[J]. IEEE Computer Society, 2008,10.1109/WiMob:410-414.
[5] Igor Kim, Young Chul Jung, Yong Tak Kim. Low Latency Proactive Handover Scheme for Proxy
MIPv6 with MIN[J],SpringerLink, 2008, Volume 5297:344-353.
[6] Linoh A.Magagula, Olabisi E.Falowo, H.Anthony Chan.Handover Optimization in Heterogeneous
Wireless Networks: PMIPv6 vs. PMIPv6 with MIH [C] .Southern Africa Telecommunication
Networks and Applications Conference, 2009.
[7] Nitesh M. Tarbani, B.R. Chandavarkar. Implementation of AAA Server for PMIPv6 in NS-2[J].
PDCTA,2011. IEEE, 2011.
[8] Viswanathan M, Yi M K, Yun S Y, et al. A novel local mobility anchor selection scheme for proxy
mobile IPv6 networks[C], Proceedings of the 6th International Conference on Ubiquitous Information
Management and Communication. ACM, 2012: 49.
[9] Baek J J, Song J S. Adaptive context transfer scheme for fast handoff in Proxy Mobile IPv6[C], Next
Generation Mobile Applications, Services and Technologies, 2008. NGMAST'08. The Second
International Conference on. IEEE, 2008: 127-130.
[10] Banerjee K, Tahasin Z I, Uddin R. An Efficient Handover Scheme for PMIPv6 in IEEE
802.16/WiMAX Network[J]. International Journal of Electrical & Computer Sciences, 2011, 11(5)
AUTHORS
Hewei Yu
Professor of South China University of Technology. His research interests focus on
integration technology of heterogeneous wireless networks. He directed several projects
supported by the National Natural Science Foundation of China, Science & Technology
projects of Guangdong Province, and Guangzhou City.
Meiling Zhou
Got her Master degree from South China University of Technology. Her research
direction is handoff technology of Proxy Mobile IPv6. Now she is working in the GF
Fund Management Co. Ltd.

More Related Content

PDF
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
PPT
Copy Of Copy Of Gprs
PDF
Mit6 02 f12_chap18
PPT
BICC protocol and application
PPT
Gprs
PDF
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute Operations
DOCX
Arun prjct dox
PDF
40520130101004
IMPROVED HANDOVER ALGORITHM TO AVOID DUPLICATION AAA AUTHENTICATION IN PROXY ...
Copy Of Copy Of Gprs
Mit6 02 f12_chap18
BICC protocol and application
Gprs
Quantitative Evaluation for PMPIv6 Multicast Fast Reroute Operations
Arun prjct dox
40520130101004

What's hot (20)

PDF
Conns connlimits
PDF
Integrated services and RSVP - Protocol
PPTX
Mcseminar
DOCX
PPT
Point to-point-protocol
PPTX
PPP(Point-to-Point Protocol): Components & Characteristics
PPT
Gprs[1]
PDF
Studying_the_TCP_Flow_and_Congestion_Con.pdf
 
PDF
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
PDF
Chapter3 transport layer
PDF
Implementation_and_Analysis_of_the_6LoWPAN.pdf
 
PPT
Data link control
PDF
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
 
PDF
A network behavior analysis method to detect this writes about a method to ...
PDF
NANOG 80: Measuring RPKI Effectiveness
PDF
Securing Routing Protocol BGP
PPTX
ELEMENTS OF TRANSPORT PROTOCOL
PPT
Integrated and Differentiated services Chapter 17
PPT
Transport layer (computer networks)
PPTX
Lec6
Conns connlimits
Integrated services and RSVP - Protocol
Mcseminar
Point to-point-protocol
PPP(Point-to-Point Protocol): Components & Characteristics
Gprs[1]
Studying_the_TCP_Flow_and_Congestion_Con.pdf
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
Chapter3 transport layer
Implementation_and_Analysis_of_the_6LoWPAN.pdf
 
Data link control
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
 
A network behavior analysis method to detect this writes about a method to ...
NANOG 80: Measuring RPKI Effectiveness
Securing Routing Protocol BGP
ELEMENTS OF TRANSPORT PROTOCOL
Integrated and Differentiated services Chapter 17
Transport layer (computer networks)
Lec6
Ad

Similar to IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER (20)

PDF
A novel secure handover mechanism in
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIS
PDF
A Micro-Mobility Management Scheme for Handover and Roaming
PPTX
level 3 semester 2 presentation
PDF
Proxy Mobile IPv6 (PMIPv6)
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
DOCX
Fast Handovers in heterogeneous Wireless Networks
PDF
Developing route optimization based pmi pv6 testbed for reliable packet trans...
PDF
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
PDF
Rapidly IPv6 multimedia management schemes based LTE-A wireless networks
PDF
A01230105
PDF
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
PDF
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
PDF
High Speed data transmission in medical body sensor network by reducing the d...
PDF
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
PDF
An overview of internet engineering task force mobility management protocols...
PDF
Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...
PDF
Improvement in the mobility of mobile ipv6 based mobile networks using revers...
PDF
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
A novel secure handover mechanism in
International Journal of Engineering Research and Development (IJERD)
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIS
A Micro-Mobility Management Scheme for Handover and Roaming
level 3 semester 2 presentation
Proxy Mobile IPv6 (PMIPv6)
Welcome to International Journal of Engineering Research and Development (IJERD)
Fast Handovers in heterogeneous Wireless Networks
Developing route optimization based pmi pv6 testbed for reliable packet trans...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
Rapidly IPv6 multimedia management schemes based LTE-A wireless networks
A01230105
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
High Speed data transmission in medical body sensor network by reducing the d...
Throughput and Handover Latency Evaluation for Multicast Proxy Mobile IPV6
An overview of internet engineering task force mobility management protocols...
Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarch...
Improvement in the mobility of mobile ipv6 based mobile networks using revers...
Dynamic Map and Diffserv Based AR Selection for Handoff in HMIPv6 Networks
Ad

More from cscpconf (20)

PDF
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
PDF
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
PDF
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
PDF
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PDF
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
PDF
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
PDF
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
PDF
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
PDF
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
PDF
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
PDF
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
PDF
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
PDF
AUTOMATED PENETRATION TESTING: AN OVERVIEW
PDF
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
PDF
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
PDF
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PDF
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
PDF
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
PDF
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
PDF
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
AUTOMATED PENETRATION TESTING: AN OVERVIEW
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Electronic commerce courselecture one. Pdf
PPTX
Machine Learning_overview_presentation.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
A Presentation on Artificial Intelligence
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Cloud computing and distributed systems.
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A comparative analysis of optical character recognition models for extracting...
Electronic commerce courselecture one. Pdf
Machine Learning_overview_presentation.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
The AUB Centre for AI in Media Proposal.docx
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25-Week II
A Presentation on Artificial Intelligence
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.
MIND Revenue Release Quarter 2 2025 Press Release
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER

  • 1. Natarajan Meghanathan et al. (Eds) : CCSEA, NCOM, AIFU, DKMP, EMSA, SIPRO, SEA - 2018 pp. 165– 173, 2018. © CS & IT-CSCP 2018 DOI : 10.5121/csit.2018.80314 IMPROVED HANDOVER ALGORITHM FOR PROXY MIPv6 BASED ON AAA SERVER Hewei Yu1 and Meiling Zhou2 1 School of Computer Science & Engineering, South China University of Technology, Guang Zhou, P.R.China 2 GF Fund Management Co. Ltd., Guang Zhou, P.R.China ABSTRACT This paper proposes an improved handover algorithm which does not need authenticating again if Mobile Node moves within the same Proxy MIPv6 domain. When MN enters PMIPv6 domain at the first time, it needs to make an AAA authentication. But when MN moves between MAGs in the same domain, it can perform handover procedure without the second times of AAA authentication, and speed the handover process. We built a structure of PMIPv6 including AAA server on NS-2, and proposed an improved handover algorithm for PMIPv6 based on AAA authentication. The simulation results show that the new scheme can effectively reduce the handover latency and ratio of packet loss, and improve network performance. KEYWORDS PMIPv6; AAA; handover; fast handover 1. INTRODUCTION Nowadays, the huge commercial demand for mobile Internet has brought new opportunity and challenge of technology. In 2008, the Internet Engineering Task Force (IETF) proposed a network-based mobility management protocol called Proxy MIPv6[1] . Because of the bright prospect of PMIPv6, researchers all over the world have carried out extensive and in-depth study on PMIPv6, and provides various effective handoff scheme. As a whole, the research on PMIPv6 has many aspects, including security, handover performance etc. On the security mechanism of PMIPv6, RFC5779[2] defined AAA for authentication ,authorization and accounting. Document[3] designed and implemented the authentication and authorization of PMIPv6 network system, the testing results proved the validity and feasibility of the certification system. On the handover performance of PMIPv6, document[4] proposed a seamless handover scheme using the neighbor discovery message of IPv6 to reduce the handover latency and packet buffering at the Mobile Access Gateway (MAG) to avoid the on-the-fly packet loss during a handover for PMIPv6. However, it is unable to satisfy the real-time demand of higher business communication. Document[5] proposes a novel low latency handover scheme for PMIPv6 using Media Independent Handover (MIH) services. Document[6] tested the handover performance of PMIPv6 with and without the IEEE 802.21 MIH services in a heterogeneous wireless networks’ environment. The results showed that the handover performance had improved if the IEEE 802.21 MIH services is used, while there have some problem such as Signal overload. Of course, A scheme to Reduce Packet Loss during PMIPv6 Handover is called PL-PMIPv6, which is similar to the fast handover for MIPv6, and FH-PMIPv6 was improved based on it .
  • 2. 166 Computer Science & Information Technology (CS & IT) In the PMIPv6 system include AAA severs, when MN enters PMIPv6 domain at the first time, it is required to be authenticated. This paper proposes a scheme, MN only need to be authenticated once in the same domain. In another word, when MN moves into a new MAG in the same domain, it does not need to be authenticated again, so this schema can minimize the authentication latency and packet loss. The rest of this paper is arranged as follows: the implementation of AAA server for PMIPv6 is introduced in section 2. Section 3 introduces the improved handover schema to minimize typical authentication procedures. Simulation and results analysis are provided in section 4. This paper is concluded in section 5. 2. IMPLEMENTATION OF AAA SERVER FOR PMIPV6 [7] PMIPv6 introduces two network entities: MAG (Mobile Access Gateway) and LMA(Local Mobility Anchor). LMA is the home agent for the MN in a PMIPv6 domain. It is the topological anchor point for the MN’s home network prefix(es) and is the entity that manages the MN’s binding state. MAG is a function on an access router that manages the mobility-related signalling. It is responsible for tracking the MN’s movements to and from the access link and for signalling the MN’s local mobility anchor. In this paper, the functions of AAA server are implemented in NS2 using C++ language and TCL scripts. We add two structures that is AAA server and list of policy profile. Figure1. (a) and Figure1. (b) show the working flow chart of AAA server. After AAA server is implemented, Figure.2 shows the signal flow when MN moves from P- MAG(pre-MAG) to N-MAG (new-MAG) in the same PMIPv6 domain. Figure 1. (a) Create list of policy profile (b) Judging the legality of MN The whole handover procedure goes as follows: 1) P-MAG sends DeReg PBU message (including MN-HNP and Proxy-CoA) to LMA when it detects that MN is going to leave. Then LMA can release the binding between MN-HNP and Proxy-CoA of MN. 2) LMA starts the delay timer immediately when it receivs DeReg PBU message. So LMA allows N-MAG to wait for a period of time before updating the binding cache entry, and replies DeReg
  • 3. Computer Science & Information Technology (CS & IT) 167 PBA message to P-MAG simultaneously. 3) P-MAG receives DeReg PBA message. 4) When N-MAG detects the attachment of MN, N-MAG obtains information about MN. Then MN sends RS message to N-MAG. 5) N-MAG sends QUERY message to AAA server after received RS message, then gets policy profile of MN. 6) After MN’s successful access authentication, N-MAG sends PBU message to LMA to update the LMA about the current location of MN. 7) Upon receiving the PBU message, LMA updates binding cache entry. LMA sends PBA message including MN-HNP. 8) After receiving the PBA message, N-MAG sets up a tunnel to LMA and adds a default route over tunnel to LMA. N-MAG then sends RA message to MN on the access link to advertise the MN-HNP. 9) When MN receives RA and know that there are no change on L3 interface after checking, it keeps the same IP address and uses it for packet delivery. Figure 2. Signal flow of Proxy MIPv6 based on Inter-Domain Handover
  • 4. 168 Computer Science & Information Technology (CS & IT) As signal flow chart shows, the handover schemes for PMIPv6 networks includes deregistration ( 1)-3) ),authentication( 4)-5) ) and registration( 6)-9) ) phases. 3. IMPROVED HANDOVER SCHEME In order to reduce the longer latency and extra cost caused by combining the AAA function while guaranteeing the handover performance, some handover procedure have been proposed as follows: in document[8], the AAA server selects the most suitable LMA based on the load information received from the LMAs. Moreover, the LMA performs admission control based on the number of current mobile nodes registered to the LMA. Document[9] proposed adaptive context transfer schemes for a fast handoff in Proxy MIPv6 which reduces the latency in AAA authentication and specifies context transfer scenarios taking into account proactive and reactive handover. When MNs attempt to handover inter/intra domain, the AAA context information stored in LMAs and MAGs will be used to support the handover without visiting the AAA server. Other documents put forward an configuration file based intra-domain handover method in PMIPv6. Optimize the intra-domain handover performance by expanding the contents of the configuration file and adding the proxy care-of address option. Of course, there are many improved schemes based on AAA server. In this section we discuss our proposed scheme to reduce the handover latency of Proxy MIPv6 which is based on intra domain. As we know, handover latency in PMIPv6 is caused due to following four latencies[10] : Link switching latency AAA authentication latency MN registration latency Latency due to Router Solicitation(RS) message and Router Advertisement(RA) message In the proposed scheme, the handover latency is reduced due to AAA authentication again in the same domain. As mentioned previously, the MAG detects the movements of MN and performs mobility-related signalling with the LMA in place of the MN. As Fig3 shows, the serving MAG(i.e.,P-MAG) will send handover initial (HI) message to the target MAG(i.e.,N-MAG) when MN is going to leave. Then N-MAG will be told the MN has been authentication. First ,N-MAG stores information (such as the AAA initiation information of MN(i.e.,MN-ID) and the address of LMA ) from HI message. Then N-MAG sends back a handover acknowledge(HACK) message to P-MAG. During this time, MN has not disconnected from P-MAG, so all the data packets are forwarded through P-MAG as before. P-MAG sends DeReg PBU message to LMA while detects MN is disconnect. The deregistration period is the same as mentioned previously. When N-MAG detects that MN enters or gets the Route Solicitation(RS) message from MN, it will check whether the MN’s information (including MN-ID and LMAA) have already existed. If N-MAG has MN’s information, it means that MN has been authenticated. So it is not need to registration again. Here we give some analysis about handover latency. Usually handover latency is marked by the maximum time interval between MN receives the last packet from the P-MAG and the first packet from N-MAG. Using some marks such as TDeReg (deregistration) ,TAuth (authentication), TReg(registration), TMN-MAG (MN and MAG), TMAG-LMA (MAG and LMA), TMAG-
  • 5. Computer Science & Information Technology (CS & IT) 169 AAA(MAG and AAA) and TL2 (layer2 handover), we can get handover latency (HL) of traditional algorithm according to Fig4.1. Figure 3. Signal flow of proposed Proxy MIPv6 based on intra-domain. HL= TDeReg +TL2 +TRS + TAuth + TReg + TRA = 4TMAG,LMA+TL2 +2TMN,MAG +2TMAG,AAA (1) The handover latency (HL) of proposed algorithm is as the following according to Figure 4 (b). HL= TDeReg +TL2 +TRS + TReg + TRA = 4TMAG,LMA+TL2+2TMN,MAG (2) Compare equation (1) and (2), you will find that the delay of AAA authentication is eliminated in our algorithm.
  • 6. 170 Computer Science & Information Technology (CS & IT) Figure 4. (a) Handover latency of PMIPv6 Figure 4. (b) Handover latency of proposed PMIPv6 4. SIMULATION AND ANALYSIS We have taken simulation using NS-2 and compared the performance of the proposed scheme with the previous and the ordinary one when MN moves between MAGs in the same domain. In the simulation, we assumed correspondent node(CN) sent packets to MN and MN moved form P-MAG to N-MAG , the packets from CN get to MAG through LMA and router. The simulation model is shown in Figure 5. The time in the simulation is controlled in 20 seconds. CN sent data packets at intervals of 0.05s after 1.0 second. At 14.4 second, MN moved away from P-MAG and went toward N-MAG. Figure 5. Practical simulation model
  • 7. Computer Science & Information Technology (CS & IT) 171 2.1. Handover latency comparison The handover latency comparison between ordinary (marked by black) and proposed (marked by red) scheme is show in Fig6. The abscissa represents the simulation time, the ordinate represents handover latency. Because of MN has not entered PMIPv6 network at the starting time, there are not handover latency and the delay time is 0s. The packets transfer delay is 0.05s. There are two high vertical line, the first line represents the latency that MN enters a new Proxy MIPv6 domain and attaches to P-MAG. The graph shows, handover latency is sharp increased up to 1.02s at 1s. It is the same as the ordinary scheme. However, there are visible difference in second line. The second line represents the latency that MN enters N-MAG. The handover latency of ordinary scheme is sharp increased up to 0.5s while it is 0.45s in proposed scheme, which shows that the proposed scheme can reduce the handover latency. Figure 6. Handover latency comparison between ordinary and proposed scheme Table 1 shows some parameters about handover latency in the simulation. Table 1. Some parameters in the simulation Scheme Start time of handover(s) Finish time of handover(s) Handover latency(s) Previous scheme 14.4 14.9 0.5 Proposed scheme 14.4 14.85 0.45 Both of the start time of handover of the two scheme are 14.4s. The proposed scheme has finished handover at 14.85s, and the ordinary one has finished at 14.9s. Handover latency of the ordinary scheme =0.5s Handover latency of the proposed scheme =0.45s Obviously, the handover latency of the proposed scheme has been reduced 0.05s (0.5- 0.45=0.05s). It is decreased by 10% ((0.05/0.5)*100%=10%) according to our proposal. 2.2. Packet loss rate Figure 7 shows the number of packet loss comparison of ordinary and proposed scheme. In this simulation , ordinary scheme lost 9 packets. As while as the proposed scheme lost 8 which is less than the ordinary one.
  • 8. 172 Computer Science & Information Technology (CS & IT) In the simulation, the largest number of data packet is 383 in two scheme by checking the simulation output trace file. So we can get table2. Figure 7. Number of packet loss of ordinary and proposed scheme All of the forward data packets are 383. The number of packet loss are 9 and 8 in ordinary and proposed scheme respectively. Obviously, the ratio of packet loss of our proposed scheme has been reduced 1(9-8=1). So the ratio of packet loss is decreased by 11.11% ((1/9)*100%≈11.11%) according to our proposal. To sum up, the proposed scheme is characterized by completed N-MAG authentication in advance of handover, so there is no need of authentication again. It is clear from the result of simulation, the proposed scheme reduces the handover latency and the ratio of packet loss without increased throughput. Table 2. packet loss comparison of ordinary and proposed scheme Scheme The number of loss The number of forward Packet loss ratio Previous scheme 9 383 ≈2.35% Proposed scheme 8 383 ≈2.09% 5. CONCLUSIONS In this paper, we introduce the present development of PMIPv6 and the way to add AAA server to PMIPv6 in NS-2. What’s more, we have proposed an improved handover scheme which can minimize handover latency and ratio of packet loss by omitting operation of AAA authentication again in the same domain. We evaluate the performance of both the ordinary and the proposed scheme in NS-2 using a PMIPv6 system model. The simulation results show that our proposed scheme can effectively reduce the handover latency and ratio of packet loss. However, there are some drawbacks, for example, it is only satiable for intra-domain handover, the security issues is not perfect etc. Further work should include the improvement and simulation jobs aimed at the problems above. ACKNOWLEDGEMENTS This study is supported by National Natural Science Foundation of China (No. 61070179), Guangzhou Science & Technology Project (No.2014J4100019), Key Collaborative Innovation Project among Industry, University and Institute of Guangzhou(No. 201604010001).
  • 9. Computer Science & Information Technology (CS & IT) 173 REFERENCES [1] S. Gundavelli (Ed.), K. Leung, V. Devarapalli, K. Chowdhury and B. Patil, 'Proxy Mobile IPv6', Internet Engineering Task Force RFC 5213, August 2008. [2] J. Korhonen, Ed.Diameter Support for Proxy Mobile IPv6[S].IETF RFC 5779,2010. [3] LV Jianhua, ZHOU Huachun, QIU Luwei,et al. Implementation of authentication and authorization of proxy mobile IPv6. Computer Engineering and Application, 2012,48(22):109-116. [4] Ju Eun Kang, Dong Won Kun, Yang Li, You Ze Cho. Seamless Handover Scheme for Proxy Mobile IPv6[J]. IEEE Computer Society, 2008,10.1109/WiMob:410-414. [5] Igor Kim, Young Chul Jung, Yong Tak Kim. Low Latency Proactive Handover Scheme for Proxy MIPv6 with MIN[J],SpringerLink, 2008, Volume 5297:344-353. [6] Linoh A.Magagula, Olabisi E.Falowo, H.Anthony Chan.Handover Optimization in Heterogeneous Wireless Networks: PMIPv6 vs. PMIPv6 with MIH [C] .Southern Africa Telecommunication Networks and Applications Conference, 2009. [7] Nitesh M. Tarbani, B.R. Chandavarkar. Implementation of AAA Server for PMIPv6 in NS-2[J]. PDCTA,2011. IEEE, 2011. [8] Viswanathan M, Yi M K, Yun S Y, et al. A novel local mobility anchor selection scheme for proxy mobile IPv6 networks[C], Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication. ACM, 2012: 49. [9] Baek J J, Song J S. Adaptive context transfer scheme for fast handoff in Proxy Mobile IPv6[C], Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST'08. The Second International Conference on. IEEE, 2008: 127-130. [10] Banerjee K, Tahasin Z I, Uddin R. An Efficient Handover Scheme for PMIPv6 in IEEE 802.16/WiMAX Network[J]. International Journal of Electrical & Computer Sciences, 2011, 11(5) AUTHORS Hewei Yu Professor of South China University of Technology. His research interests focus on integration technology of heterogeneous wireless networks. He directed several projects supported by the National Natural Science Foundation of China, Science & Technology projects of Guangdong Province, and Guangzhou City. Meiling Zhou Got her Master degree from South China University of Technology. Her research direction is handoff technology of Proxy Mobile IPv6. Now she is working in the GF Fund Management Co. Ltd.