A Novel Signaling Scheme for Route Optimization and Session Continuity In MIPV6 Networks | Open Access Journals

ISSN ONLINE(2319-8753)PRINT(2347-6710)

Yakışıklı erkek tatil için bir beldeye gidiyor burada kendisine türk Porno güzel bir seksi kadın ayarlıyor Onunla beraber otel odasına gidiyorlar Otel odasına rokettube giren kadın ilk önce erkekle sohbet ederek işi yavaş halletmeye çalışıyor sex hikayeleri Kocası fabrikatör olan sarışın Rus hatun şehirden biraz uzak olan bir türk porno kasabaya son derece lüks bir villa yaptırıp yerleşiyor Kocasını işe gönderip mobil porno istediği erkeği eve atan Rus hatun son olarak fotoğraf çekimi yapmak üzere türk porno evine gelen genç adamı bahçede azdırıyor Güzel hatun zengin bir iş adamının porno indir dostu olmayı kabul ediyor Adamın kendisine aldığı yazlık evde sikiş kalmaya başlayan hatun bir süre sonra kendi erkek arkadaşlarını bir bir çağırarak onlarla porno izle yapıyor Son olarak çağırdığı arkadaşını kapıda üzerinde beyaz gömleğin açık sikiş düğmelerinden fışkıran dik memeleri ile karşılayıp içeri girer girmez sikiş dudaklarına yapışarak sevişiyor Evin her köşesine yayılan inleme seslerinin eşliğinde yorgun düşerek orgazm oluyor

A Novel Signaling Scheme for Route Optimization and Session Continuity In MIPV6 Networks

V. Valarmathi1, C. Dhivya2
  1. PG Student, Department Of ECE, DMI College of Engineering, Chennai-600123, India.
  2. Lecturer, Department Of ECE, DMI College of Engineering, Chennai-600123, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Science, Engineering and Technology

Abstract

This paper presents a secure MIPv6 with secure and efficient Route optimization (RO). It uses DNSSEC to validate cryptographically generated address from trusted domain and provide strong authentication rather than weak sender. Route optimization which prevents the traffic occurring in the network while transferring the packets or data.Also session continuity is maintained during handover from one network to other network in the proposed work.MIPv6 networks is used to replace the triangle routing by MN to communicate bidirectional with the CN without passing through its home agent. This is done using network simulation (ns2) platform. This platform supports the real time applications.

Keywords

Route optimization, CGA, DNSSEC, MIPv6, Visiting Home agent.

INTRODUCTION

The main focus in this paper is on MIPv6, it is important to note that the proposed RO mechanism fits in the MN-initiated actions philosophy. Two modes are available for data to be transferred between MN and CN. First, the bidirectional tunneling (Fig.1) sends data in an IP-in-IP tunnel using the MN’s home agent(HA) as the intermediary entity that encapsulates the received data.Although inefficient, especially when both the MN and CN are relatively close to each other, establishing a bidirectional tunnel between the HA and nodes is currently the preferred way for the operator to provide services.
Route optimization enables data to be directly exchanged between the MN and CN,where MN fills the
MIP destination option with its HA and then CN uses the routing to send packets back to the MN. Prior to exchanging data directly between the MN and CN. This paper presents secure MIPv6 which is a secure and efficient RO mechanism for MIPv6.
image

II.SECURE ROUTE OPTIMIZATION IN SMIPv6 USING ECGA AND DNSSEC

The main idea behind using DNSSEC and ECGA is to authenticate a message according to the domain from which it originated. This section first presents the objectives and assumptions of the proposals. Second, the integration of ECGA in the SMIPv6 is detailed execution in various MIPv6 scenarios leading to the RO.

A. objectives

The objectives of the secure RO proposal are as follows
1) Be as secure as HCBU while relying on the realistic assumptions.
image
image
For CN to validate the CGCoA,it requires a signature involving MN,VHA,HA.MN sends a message 1 to Home agent, it checks with DNS.After making sure that the domain name is same, message 2 is sent to visiting home agent.vHA checks with mobile node, then the message 3 is transferred to corresponding node.MN’s new CGCoA must authenticate with corresponding, when the handover is executed inside the same network.Otherwise new vHA has to be signed,thus connection becomes invalid and route optimization execution must start from beginning.
The symmetric key KMN-CN,along with the signed visited token,is used to authenticate MN’s new CGCoA to the CN when the handover has been executed inside the same visited domain.Otherwise,the Auth token must be signed by the new vHA,and thus becomes invalid and the RO execution must starts from the beginning.

D.Flush Request for SMIPv6

When the MN detaches from its visited network while leaving ongoing flows active,vHA informs the CNs to stop sending their flow with a Flush request(FR)message
FR(CN\CGCoA\CGCoA Param)\CGvHA Param)\CGvHA Sign

III.SECURITY VALIDATION OF SMIPv6

The executions in the home and visited networks,the BT and the RO of SMIPv6 have been implemented in NS- 2,runned by the VMware(virtual machine).The TCL coding is simulated in the virtual machine.The following coding is to setup ns and topology object.
image

V. OUTPUTS AND GRAPH

Mobile node(MN) generates cryptographically generated home address(CGHA) and submit in home agent(HA).HA sends acknowledgement regarding storage success to MN.MN sends communication request to HA.HA sends fully qualified domain name(FQDN) to MN.HA adds the MN IP in the white list. After this the transferring of data packets takes place. weak authentication to ensure sender invariance of the router advertisement messages strong authentication for all other messages sent from the MN, HA, VHA and the DNS server.
secrecy to ensure confidentiality of symmetric keys held by the MN and shared with its HA and the CNs.DNSSEC enables a node to securely verify if a CGA is part of a trusted domain. Given that a CGA cannot be spoofed, receiving a message from a CGA signed by a trusted entity(HA/VHA) of a trusted domain increases the security property to strong authentication instead of sender invariance.
image
However, because no assumption has been given about the knowledge of trusted domains to the MN, it must rely initially on the sender invariance property for the router advertisements. Note that the sender invariance is implemented in NS2 using the weak authentication on goal along with a witness and request security predicates using the message’s source identity as the authenticator and the authenticated.
The previous paper uses the AVANTSSAR tool for performing this route optimization and bidirectional tunneling method.The proposed system uses the network simulation software for performing the optimization algorithm.So this algorithm works better in network simulation software.

GRAPH

The curve denotes the packets transfer rate for the corresponding simulation time.At starting the initialization process is going on,so the packet transfer does not takes place.upto 100th point there is no transfer of packects,only communication request takes place between home agent and mobile node and between server and mobile node.After these process only tranfer of packets takes place.The curve increases corresponding to the simulation time.
image
image

VI. CONCLUSION AND FUTURE WORK

This paper proposed a secure MIPv6 (SMIPv6) that includes a new secure and efficient RO using an ECGA to tackle the RR weaknesses and the unrealistic assumptions of existing works. Moreover, the use of trusted domains allowed the HA, VHA, and CN to strongly authenticate all incoming messages, thus tackling all major attacks while relying on realistic assumptions and keeping the radio signaling overhead to a minimum. And also the future work includes session continuity during rapid handover. The way of implementation is done by mobility monitoring,vHA analysis and finally handover to VHA.There MN’s services continue without any interruption. Results are simulated using network simulation.

References

[1] A. Z. M. Shahriar and M. Atiquzzaman, “Evaluation of prefix delegation-based route optimization schemes for NEMO,” in IEEE International Conference on Communication, Dresden, Germany, Jun. 14-18, 2009.

[2] Deguang Le, Jinyi Chang School of Computer Science & Engineering,Chang shu Institute of Technology Changshu 215500,China ‘’Tunnelling-Based Route Optimization for Mobile IPv6” {ledeguang,changjy}@cslg.edu.cn.

[3] D.Kavitha *, Dr.K.E.Sreenivasa Murthy, S.Zahoor ul Huq 2010 International Conference on Recent Trends in Information, Telecommunication and Computing ‘’ Security Analysis of Binding Update Protocols in Route Optimization of MIPv6” .

[4] Abu Zafar M. Shahriar and Mohammed Atiquzzaman “Performance of Prefix Delegation-Based Route Optimization Schemes: Intra Mobile Network case” IEEE Communications Society subject matter experts for publication in the IEEE ICC 2010 proceedings,shahriar,atiq}@ou.edu.

[5] NamYeong Kwon School of Information and Communication Engineering Sungkyunkwan University Suwon, Korea,” The Reliable Packet Transmission Based on PMIPv6 Route Optimization” 978-1-4673-0990- 5/12/$31.00 ©2012 IEEE.

[6] Li Xia, Lizheng Fang , Hong Liu “A Low-latency and Smooth Handover Scheme for Mobile IPv6”, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application,College of Information Science and Engineering, Northeastern University, Shenyang 110004, China,”.

[7] K. Ren, W. Lou, K. Zeng, F. Bao, J. Zhou, and R. H. Deng, “Routing optimization security in mobile IPv6,” Comput. Netw., vol. 50, no. 13,pp. 2401–2419, 2006.

[8] B. S. V. R. S. u. H. D. Kavitha and K. E. Sreenivasa Murthy, “An efficient hierarchical certificate based binding update protocol for route optimization in mobile IPv6,” Global J. Comput. Sci. Tech., vol. 10, no. 2, pp. 47–51, 2010.