SHIP: Performance Reference: “SHIP mobility management hybrid SIP-HIP scheme” So, J.Y.H.; Jidong Wang; Jones, D.; Sixth International Conference on 23-25.

Slides:



Advertisements
Similar presentations
Keiji Maekawa Graduate School of Informatics, Kyoto University Yasuo Okabe Academic Center for Computing and Media Studies, Kyoto University.
Advertisements

Using HIP to solve MULTI-HOMING IN IPv6 networks YUAN Zhangyi Beijing University of Posts and Telecommunications.
Stream Control Transmission Protocol (SCTP) Readdressing Retransmission Trigger draft-micchie-tsvwg-fastmsctp-01 Michio Honda Keio University
M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
IPSec.
IPv6 Keith Wichman. History Based on IPv4 Based on IPv4 Development initiated in 1994 Development initiated in 1994.
IP Mobility Support Basic idea of IP mobility management
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1/32 Internet Architecture Lukas Banach Tutors: Holger Karl Christian Dannewitz Monday C. Today I³SI³HIPHI³.
By Rod Lykins.  Background  Benefits  Security Advantages ◦ Address Space ◦ IPSec  Remaining Security Issues  Conclusion.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Mobile IP.
IP Mobility Support Basic idea of IP mobility management o understand the issues of network-layer mobility support in IP network o understand the basic.
K. Salah1 Security Protocols in the Internet IPSec.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Issues of HIP in an Operators Network Nick Papadoglou Thomas Dietz.
Host Identity Protocol
Process-to-Process Delivery:
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Handoff in IEEE Andrea G. Forte Sangho Shin Prof. Henning Schulzrinne.
1 Network Security Lecture 8 IP Sec Waleed Ejaz
Connecting The Network Layer to Data Link Layer. ARP in the IP Layer The Address Resolution Protocol (ARP) The Address Resolution Protocol (ARP) Part.
Security Issues in PIM-SM Link-local Messages J.W. Atwood, Salekul Islam {bill, Department.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
MOBILE IP GROUP NAME: CLUSTER SEMINAR PRESENTED BY : SEMINAR PRESENTED BY : SANTOSH THOMAS SANTOSH THOMAS STUDENT NO: STUDENT NO:
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
HIP proxy Patrik Salmela Contents Background: ID-locator split HIP Why a HIP proxy Functionality of a HIP proxy The prototype.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
ETE Framework for QoS guarantee in Heterogeneous Wired-cum-Wireless Networks (cont.) 홍 석 준
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
An Introduction to Mobile IPv4
Mobile IP 순천향대학교 전산학과 문종식
4343 X2 – The Transport Layer Tanenbaum Ch.6.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
K. Salah1 Security Protocols in the Internet IPSec.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
HIP-Based NAT Traversal in P2P-Environments
Computer and Network Security
Chapter 5 Network Security Protocols in Practice Part I
Lecture 3 By Miss Irum Matloob.
Internet and Intranet Fundamentals
BINF 711 Amr El Mougy Sherif Ismail
Understand Networking Services
ADDRESSING Before you can send a message, you must know the destination address. It is extremely important to understand that each computer has several.
Virtual Private Networks (VPNs)
Application Layer Mobility Management Scheme for Wireless Internet
CS4470 Computer Networking Protocols
Unit 8 Network Security.
Presentation transcript:

SHIP: Performance Reference: “SHIP mobility management hybrid SIP-HIP scheme” So, J.Y.H.; Jidong Wang; Jones, D.; Sixth International Conference on May 2005 Page(s): Digital Object ID /SNPD-SAWN

2005/12/62 Background In the current wireless networks, wireless management can be handled in Data Link Layer or Physical Layer In the 4G wireless networks, handover between different wireless networks can’t be handle by the old method Network Layer and Application Layer are the most suitable layers for the mobility management

2005/12/63 Session Initiation Protocol An Application Layer protocol used to create or tear down multimedia session Can perform mobility support that is independent of the underlying wireless technology and network layer element in the Application Layer The best choice for real-time application only

2005/12/64 Session Initiation Protocol (cont.) Application Layer protocol will get lowest priority in networking model and so a long delay in hand-off will occur Doesn’t support mobility in other connections that aren’t created under SIP Hybrid SIP and other protocols are considered by many research changing addresses or ports, adding a media stream, deleting a media stream, etc.  re-INVITE

2005/12/65 Host Identify Protocol Introduces a new namespace - Host Identity and a new layer - Host Identity Layer HI (Host Identifier) is represented with a 128- bit long HIT (Host Identity Tag) HI that is a cryptographic key of a public- private key-pair will be used to identify node and endpoint instead of IP addresses PrefixHash

2005/12/66 Host Identity Layer

2005/12/67 Host Identify Protocol (cont.) 4-way handshake Diffie-Hellman authenticated key is exchanged during handshake Diffie-Hellman key is used to establish a pair of IPsec ESP (Encapsulated Security Payload) SAs (Security Associations) between hosts

2005/12/68 4-way handshake of HIP InitiatorResponder I1: trigger exchange Select pre-computed R1 R1: puzzle, D-H, key, sig Check sigRemain stateless Solve puzzle I2: solution, D-H, {key}, sig Compute D-HCheck puzzle Check sig R2: sig Check sigCompute D-H Security Context established ESP protected messages

2005/12/69 HIP packet structure Packets traveling in the network doesn’t contain the actual HI information Next HeaderHeader Length0Packet TypeVER.RES.1 ChecksumControls Sender's Host Identity Tag Receiver's Host Identity Tag HIP Parameters

2005/12/610 HIP packet structure (cont.) Arriving packets is identified and mapped to the correct SA using the SPI (Security Parameter Index) value in the IPsec header

2005/12/611 HIP - mobility DNS may not be able to update immediately RVS (Rendezvous Server) is similar to the HA in Mobile IP DNS will carry the mapping between FQDN and the corresponding RVS IP addresses Direct mapping between HI and IP addresses of the host will be stored in RVS

2005/12/612 4-way handshake of HIP via RVS

2005/12/613 HI-IP Mapping A.DNS only B.DNS with RVS

2005/12/614 HIP - Mid-session mobility Send the UPDATE package with REA (Readdress) parameter to the other nodes and its RVS Critical scenarios  Double jump problem  IP address changes during the 4-way handshakes  Solved by involving RVS

2005/12/615 SHIP (Hybrid SIP-HIP) Pre-session  SIP location server will return the HI address instead of an IP address  Until the mapping of the SIP, URI and HI address is changed, no updates are required in the SIP location server Mid-session  HIP UPDATE package with REA parameter will be sent to the corresponding host  SIP doesn’t need to send re-INVITE message

2005/12/616 SHIP Procedures

2005/12/617 Handoff Signaling Analysis D handoff = D dhcp + D notice D notice = O handoff =

2005/12/618 Handoff Signaling Parameters SymbolMeaningTypical value D dhcp Delay of DHCP address assignment1s D notice Delay for MH to notify CH of its new location BW wired Bandwidth of wired links100Mb/s BW wireless Bandwidth of wireless links11Mb/s (802.11b) L wired Latency of wired links0.5ms L wireless Latency of wireless links2ms HDistance between MH and CH in hops LIP packet length of notice message TsAverage time for which MH remains in a subnet

2005/12/619 Handoff Signaling Delay SIP =140 bytes; HIP = 80 bytes; Mobile IP = 56 bytes

2005/12/620 Handoff Signaling Delay (cont.) Hybrid SIP-Mobile IP need to use HA to re- direct the packet until the SIP re-INVITE progress is completed  Two handoff processes are needed in one handoff Handoff only needs to be processed once in SHIP

2005/12/621 Handoff Signaling Overhead H=50

2005/12/622 Handoff Signaling Overhead (cont.) Overhead of hybrid SIP-Mobile IP scheme will be the sum of the Mobile IP and SIP as two handoff processes are needed SHIP has been shown to outperform than hybrid SIP-Mobile IP

2005/12/623 Conclusion This paper has proposed SHIP for future IP based wireless networks SHIP avoids the re-INVITE message in SIP and therefore, its signaling message is smaller SHIP also provides multi-homing support, which does not exist in hybrid SIP-Mobile IP

2005/12/624 Reference Session Initiation Protocol  RFC-3261 HIP Working Group (Internet-Draft)  Host Identity Protocol - Extended Abstract  Ericsson Research, NomadicLab (WWRF8bis) Mobility support in wireless Internet  Wireless Communications (IEEE)