Mobile Node

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 360 Experts worldwide ranked by ideXlab platform

Charles E Perkins - One of the best experts on this subject based on the ideXlab platform.

  • ip mobility support for ipv4 revised
    RFC, 2010
    Co-Authors: Charles E Perkins
    Abstract:

    This document specifies protocol enhancements that allow transparent routing of IP datagrams to Mobile Nodes in the Internet. Each Mobile Node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a Mobile Node is also associated with a care-of address, which provides information about its current point of attachment to the Internet. The protocol provides for registering the care-of address with a home agent. The home agent sends datagrams destined for the Mobile Node through a tunnel to the care-of address. After arriving at the end of the tunnel, each datagram is then delivered to the Mobile Node.

  • Mobile ipv4 challenge response extensions revised
    RFC, 2007
    Co-Authors: Pat Calhoun, Jayshree Bharatia, Charles E Perkins
    Abstract:

    Mobile IP, as originally specified, defines an authentication extension (the Mobile-Foreign Authentication extension) by which a Mobile Node can authenticate itself to a foreign agent. Unfortunately, that extension does not provide the foreign agent any direct guarantee that the protocol is protected from replays and does not allow for the use of existing techniques (such as Challenge Handshake Authentication Protocol (CHAP)) for authenticating portable computer devices. In this specification, we define extensions for the Mobile IP Agent Advertisements and the Registration Request that allow a foreign agent to use a challenge/response mechanism to authenticate the Mobile Node. Furthermore, this document updates RFC 3344 by including a new authentication extension called the Mobile-Authentication, Authorization, and Accounting (AAA) Authentication extension. This new extension is provided so that a Mobile Node can supply credentials for authorization, using commonly available AAA infrastructure elements. This authorization-enabling extension MAY co-exist in the same Registration Request with authentication extensions defined for Mobile IP Registration by RFC 3344. This document obsoletes RFC 3012. [STANDARDS-TRACK]

  • securing Mobile ipv6 route optimization using a static shared key
    RFC, 2006
    Co-Authors: Charles E Perkins
    Abstract:

    A Mobile Node and a correspondent Node may preconfigure a Binding Management Key for authorizing Binding Updates.

  • authentication authorization and accounting aaa registration keys for Mobile ipv4
    RFC, 2005
    Co-Authors: Charles E Perkins
    Abstract:

    Authentication, Authorization, and Accounting (AAA) servers, such as RADIUS and DIAMETER, are in use within the Internet today to provide authentication and authorization services for dial-up computers. Mobile IP for IPv4 requires strong authentication between the Mobile Node and its home agent. When the Mobile Node shares an AAA Security Association with its home AAA server, however, it is possible to use that AAA Security Association to create derived Mobility Security Associations between the Mobile Node and its home agent, and again between the Mobile Node and the foreign agent currently offering connectivity to the Mobile Node. This document specifies extensions to Mobile IP registration messages that can be used to create Mobility Security Associations between the Mobile Node and its home agent, and/or between the Mobile Node and a foreign agent. [STANDARDS-TRACK]

  • authentication authorization and accounting aaa registration keys for Mobile ipv4
    RFC, 2005
    Co-Authors: Charles E Perkins
    Abstract:

    Authentication, Authorization, and Accounting (AAA) servers, such as RADIUS and DIAMETER, are in use within the Internet today to provide authentication and authorization services for dial-up computers. Mobile IP for IPv4 requires strong authentication between the Mobile Node and its home agent. When the Mobile Node shares an AAA Security Association with its home AAA server, however, it is possible to use that AAA Security Association to create derived Mobility Security Associations between the Mobile Node and its home agent, and again between the Mobile Node and the foreign agent currently offering connectivity to the Mobile Node. This document specifies extensions to Mobile IP registration messages that can be used to create Mobility Security Associations between the Mobile Node and its home agent, and/or between the Mobile Node and a foreign agent. [STANDARDS-TRACK]

David B. Johnson - One of the best experts on this subject based on the ideXlab platform.

  • route optimization for Mobile ip
    Cluster Computing, 1998
    Co-Authors: Charles E Perkins, David B. Johnson
    Abstract:

    Route Optimization has been designed within the IETF to ameliorate the problem of triangle routing, a routing artifact introduced by Mobile IP’s requirement to route packets destined for a Mobile Node by way of its home network. In this article, we describe the current protocol specification for the Route Optimization protocol, concentrating on design decisions and justifications. Once the basic mechanisms are explained, we show how they are applied to enable foreign agents to offer smooth handoffs for Mobile Nodes, and describe the security operations that enable reliable operation of this handoff between foreign agents with which a Mobile Node has no pre-existing security relationship.

  • mobility support in ipv6
    ACM IEEE International Conference on Mobile Computing and Networking, 1996
    Co-Authors: Charles E Perkins, David B. Johnson
    Abstract:

    This document specifies Mobile IPv6, a protocol which allows Nodes to remain reachable while moving around in the IPv6 Internet. Each Mobile Node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a Mobile Node is also associated with a care-of address, which provides information about the Mobile Node's current location. IPv6 packets addressed to a Mobile Node's home address are transparently routed to its care-of address. The protocol enables IPv6 Nodes to cache the binding of a Mobile Node's home address with its care-of address, and to then send any packets destined for the Mobile Node directly to it at this care-of address. To support this operation, Mobile IPv6 defines a new IPv6 protocol and a new destination option. All IPv6 Nodes, whether Mobile or stationary, can communicate with Mobile Nodes. This document obsoletes RFC 3775.

Dong In Kim - One of the best experts on this subject based on the ideXlab platform.

  • cooperation in delay tolerant networks with wireless energy transfer performance analysis and optimization
    IEEE Transactions on Vehicular Technology, 2015
    Co-Authors: Dusit Niyato, Ping Wang, Hweepink Tan, Walid Saad, Dong In Kim
    Abstract:

    We consider a delay-tolerant network (DTN) whose Mobile Nodes are assigned to collect packets from data sources and deliver them to a sink (i.e., a gateway). Each Mobile Node operates by using energy transferred wirelessly from the gateway. For such a network, two main issues are studied. First, when a Mobile Node is at the data source, this Node must decide on whether to accept the packet received from the data source or not. In contrast, whenever a Mobile Node is at the gateway, it has to decide on whether to transmit the packets collected from the data sources or to request wireless energy transfer. Second, multiple Mobile Nodes can cooperate and form coalitions to help one another in the delivery of packets from their associated data sources. However, this cooperation may not be always beneficial due to the limited buffer and energy resources. Moreover, some Mobile Nodes may secretly decide to deviate from a given coalition, thus taking advantage of the other innocent Mobile Nodes. To address these two issues, this paper introduces a performance analysis and optimization framework, which is based on a joint optimization and game-theoretic framework. The optimization model is used to obtain the packet delivery policy of each individual Mobile Node. Then, a novel game-theoretic model, namely a repeated coalition formation game , is developed to analyze the cooperation strategies of multiple Mobile Nodes.

  • Optimal wireless energy charging policy for a Mobile Node in Smart Grid environment
    2014 IEEE International Conference on Smart Grid Communications SmartGridComm 2014, 2015
    Co-Authors: Dusit Niyato, Yang Zhang, Ping Wang, Dong In Kim
    Abstract:

    Recently, Mobile devices are equipped with wireless energy charging capability. They can be charged wirelessly by chargers located at different locations. The prices that the chargers apply to the Mobile user/Node can be changed, e.g., due to the implementation of demand side management in smart grid environment. The Mobile Node can use this price information (e.g., obtained through wireless communication) to make its charging decision accordingly. In this paper, we study an optimal wireless energy charging policy for the Mobile Node. The Mobile Node's objective is to minimize the cost due to the price of using charging service from chargers and the cost of having not enough energy. We formulate and solve a Markov decision process to obtain such an optimal policy. Additionally, we analytically prove that the optimal charging policy has a threshold structure. That is, the Mobile Node will use the charging service if its energy level is below a certain threshold. The performance evaluation shows the proposed energy charging policy achieves much better performance compared with a naive policy of always charging.

Dusit Niyato - One of the best experts on this subject based on the ideXlab platform.

  • cooperation in delay tolerant networks with wireless energy transfer performance analysis and optimization
    IEEE Transactions on Vehicular Technology, 2015
    Co-Authors: Dusit Niyato, Ping Wang, Hweepink Tan, Walid Saad, Dong In Kim
    Abstract:

    We consider a delay-tolerant network (DTN) whose Mobile Nodes are assigned to collect packets from data sources and deliver them to a sink (i.e., a gateway). Each Mobile Node operates by using energy transferred wirelessly from the gateway. For such a network, two main issues are studied. First, when a Mobile Node is at the data source, this Node must decide on whether to accept the packet received from the data source or not. In contrast, whenever a Mobile Node is at the gateway, it has to decide on whether to transmit the packets collected from the data sources or to request wireless energy transfer. Second, multiple Mobile Nodes can cooperate and form coalitions to help one another in the delivery of packets from their associated data sources. However, this cooperation may not be always beneficial due to the limited buffer and energy resources. Moreover, some Mobile Nodes may secretly decide to deviate from a given coalition, thus taking advantage of the other innocent Mobile Nodes. To address these two issues, this paper introduces a performance analysis and optimization framework, which is based on a joint optimization and game-theoretic framework. The optimization model is used to obtain the packet delivery policy of each individual Mobile Node. Then, a novel game-theoretic model, namely a repeated coalition formation game , is developed to analyze the cooperation strategies of multiple Mobile Nodes.

  • Optimal wireless energy charging policy for a Mobile Node in Smart Grid environment
    2014 IEEE International Conference on Smart Grid Communications SmartGridComm 2014, 2015
    Co-Authors: Dusit Niyato, Yang Zhang, Ping Wang, Dong In Kim
    Abstract:

    Recently, Mobile devices are equipped with wireless energy charging capability. They can be charged wirelessly by chargers located at different locations. The prices that the chargers apply to the Mobile user/Node can be changed, e.g., due to the implementation of demand side management in smart grid environment. The Mobile Node can use this price information (e.g., obtained through wireless communication) to make its charging decision accordingly. In this paper, we study an optimal wireless energy charging policy for the Mobile Node. The Mobile Node's objective is to minimize the cost due to the price of using charging service from chargers and the cost of having not enough energy. We formulate and solve a Markov decision process to obtain such an optimal policy. Additionally, we analytically prove that the optimal charging policy has a threshold structure. That is, the Mobile Node will use the charging service if its energy level is below a certain threshold. The performance evaluation shows the proposed energy charging policy achieves much better performance compared with a naive policy of always charging.

Yonggeun Hong - One of the best experts on this subject based on the ideXlab platform.

  • hybrid home network prefix model for supporting inter technology handover in proxy mipv6 domains
    The Kips Transactions:partc, 2011
    Co-Authors: Yonggeun Hong, Sangheon Pack, Joosang Youn
    Abstract:

    Recently, with the popularity of smartphones, an interest in multi-networking service through wireless multi-interface of a Mobile Node is increased. Also, wireless networking technology for using wireless multi-interface has been studied. As the related work, in the IETF Netext WG, the extension of PMIPv6 protocol for multi-interface support is being discussed. Existing PMIPv6 protocol includes the functions for simultaneous access over multi-interfaces of a Mobile Node and inter-technology handover between multi-interfaces of the Mobile Node. However, in case of the existing protocol, the problem occurs when inter-technology handover is performed after simultaneous access on the PMIPv6 domain, this problem is the discontinuous of simultaneous connections. Therefore, the PMIPv6 Protocol cannot support flow based multi-homing service. In this paper, as a way to solve the problem, Hybrid Home Network Prefix scheme is proposed.

  • hybrid home network prefix for multihoming in pmipv6
    2010
    Co-Authors: Joosang Youn, Yonggeun Hong
    Abstract:

    Proxy Mobile IPv6 (PMIPv6) supports multihoming where a Mobile Node can connect to a PMIPv6 domain through multiple interfaces for simultaneous access. However, for an inter-technology handoff, PMIPv6 does not allow simultaneous access since all the home network prefixes associated with one interface are associated with another interface of a Mobile Node. In this document, we propose a hybrid home network prefix assignment (HHNPA) scheme where both the static prefix model and the dynamic prefix model are used for simultaneous access. The static prefix model is used within the general PMIPv6 domain. On the other hand, the dynamic prefix model is employed for inter-technology handoff. That is, for IP session continuity during inter-technology handoff, a dynamic prefix model is used on both interfaces.

  • fast handover for Mobile ipv6 using access router based movement detection and coa configuration
    Vehicular Technology Conference, 2004
    Co-Authors: Yonggeun Hong, Myungki Shin, Hyoungjun Kim
    Abstract:

    This paper specifies access router based movement detection using L2 information and care-of address (CoA) configuration for fast handover in Mobile IPv6. An access router which serves a Mobile Node performs movement detection, formulates a new CoA of the Mobile Node and does duplicate address detection (DAD) on behalf of the Mobile Node. After confirming the uniqueness of a new CoA, an access router sends it through a router advertisement (RA) message. Since an access router can quickly determine L3 movement by the comparison between neighbor caches and L2 information of a Mobile Node, a Mobile Node does not have to wait to receive RA messages from access routers. Thus, movement detection delay is reduced. Since DAD is performed by an access router in advance, a Mobile Node does not have to do normal DAD and it can use a new CoA for its interface directly.