MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks

Abstract With the proliferation of mobile devices characterizing modern cyber-physical systems, service switching and handoff over large coverage areas become key aspects of the Internet of Things (IoT), mainly when remotely controlling and interacting with mission-critical autonomous vehicles that potentially may cover quite large distances such as driverless cars and Unmanned Aerial Vehicles (UAVs). These requirements can now be fully satisfied by the widespread Fast handover for Proxy Mobile IPv6 (F-PMIPv6) technology, that can be yet considered as a cornerstone in emerging 5G communications, but, unfortunately, such an approach only supports homogeneous handover, that may result in a nontrivial problem due to the heterogeneity in mobile communications technologies characterizing the available cyber-physical solutions and IoT network access devices. Recently, many researchers developed efficient solutions for the integration of F-PMIPv6 and Media Independent Handover (MIH) to allow fast handover in a highly heterogeneous mobile network. However, these models lack the security features which are necessary to protect IoT devices during handoffs. In this paper, a new security protocol, MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6 networks (MIH-SPFP), is proposed, incorporating the features of Secure Protocol for Fast-PMIPv6 (SPFP) into F-PMIPv6-MIH and reducing the security risks during the handover. The proposed solution also provides low latency by reducing the re-authentication path during the inter-Mobile Access Gateway (MAG) handovers. The security of the proposed protocol has been analyzed by using Burrows–Abadi–Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and its performance has been evaluated through numerical simulation by selecting “Marathon Broadcasting” as a case study. Results show that the proposed protocol not only effectively secures the handover process but is also more efficient compared with the standard MIH handover solution.

[1]  Ilsun You,et al.  Extension of MIH to Support FPMIPv6 for Optimized Heterogeneous Handover , 2017, Future Gener. Comput. Syst..

[2]  Samuel Pierre,et al.  An enhanced fast handover with seamless mobility support for next-generation wireless networks , 2014, J. Netw. Comput. Appl..

[3]  Ilsun You,et al.  SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers , 2017, Mob. Inf. Syst..

[4]  Vangelis Metsis,et al.  IoT Middleware: A Survey on Issues and Enabling Technologies , 2017, IEEE Internet of Things Journal.

[5]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[6]  Sang-Il Choi,et al.  Use of Proxy Mobile IPv6 for Mobility Management in CoAP-Based Internet-of-Things Networks , 2016, IEEE Communications Letters.

[7]  Borja Bordel,et al.  Building enhanced environmental traceability solutions: From Thing-to-Thing communications to Generalized Cyber-Physical Systems , 2017, J. Internet Serv. Inf. Secur..

[8]  Samiran Chattopadhyay,et al.  On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems , 2017, IEEE Access.

[9]  Fang-Yie Leu,et al.  Secure and efficient protocol for fast handover in 5G mobile Xhaul networks , 2018, J. Netw. Comput. Appl..

[10]  Julie A. McCann,et al.  UbiFlow: Mobility management in urban-scale software defined IoT , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[11]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[12]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2018, Cluster Computing.

[13]  Abderrezak Rachedi,et al.  A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology , 2016, Comput. Commun..

[14]  Aggeliki Sgora,et al.  An integrated MIH-FPMIPv6 mobility management approach for evolved-packet system architectures , 2017, J. Netw. Comput. Appl..

[15]  Ilsun You,et al.  Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks , 2017, IEEE Access.

[16]  Hyung Heon Kim,et al.  Fast-Handover Mechanism between 802.11 WLAN and 802.16 WiMax with MIH in PMIPv6 , 2009 .

[17]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[18]  Isaac Woungang,et al.  Impact Study of a Mobile Botnet over LTE Networks , 2016, J. Internet Serv. Inf. Secur..

[19]  Qinglei Kong,et al.  Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks , 2017, IEEE Internet of Things Journal.

[20]  Tai-Myung Chung,et al.  Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols , 2013, IEEE Transactions on Industrial Electronics.

[21]  Jong-Tae Park,et al.  Mobile CoAP for IoT mobility management , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[22]  Qian Zhu,et al.  IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[23]  Ilsun You,et al.  SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks , 2017, Comput. Networks.

[24]  Ian F. Akyildiz,et al.  An inter-system handoff technique for the IMT-2000 system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[25]  Igor V. Kotenko,et al.  Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[26]  Young-Joo Suh,et al.  Implementation and performance study of IEEE 802.21 in integrated IEEE 802.11/802.16e networks , 2009, Comput. Commun..

[27]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[28]  Dongqing Xie,et al.  Secure Auditing and Deduplicating Data in Cloud , 2016, IEEE Transactions on Computers.

[29]  Ilsun You,et al.  ISMA: Intelligent Sensing Model for Anomalies Detection in Cross Platform OSNs With a Case Study on IoT , 2017, IEEE Access.

[30]  John C. McEachen,et al.  On Location Privacy in LTE Networks , 2017, IEEE Transactions on Information Forensics and Security.

[31]  Fang-Yie Leu,et al.  Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks” , 2018, IEEE Systems Journal.

[32]  Md. Motaharul Islam,et al.  Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs , 2011, Sensors.

[33]  Ilsun You,et al.  Towards formal analysis of wireless LAN security with MIS protocol , 2011, Int. J. Ad Hoc Ubiquitous Comput..

[34]  Mohammed Atiquzzaman,et al.  Cost analysis of mobility protocols , 2013, Telecommun. Syst..

[35]  Dong Ren,et al.  A forward fast media independent handover control scheme for Proxy Mobile IPv6 (FFMIH-PMIPv6) over heterogeneous wireless mobile network , 2017, Telecommun. Syst..

[36]  Mohammed Aly Abdrabou,et al.  LTE Authentication Protocol (EPS-AKA) weaknesses solution , 2015, 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS).

[37]  Ramón Alcarria,et al.  Enhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical Systems , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[38]  Luca Viganò,et al.  Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.

[39]  Gianpiero Costantino,et al.  Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[40]  Sungho Choi,et al.  Enhancements to FPMIPv6 for improved seamless vertical handover between LTE and heterogeneous access networks , 2013, IEEE Wireless Communications.

[41]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[42]  Telemaco Melia,et al.  IEEE 802.21 enabled mobile terminals for optimized WLAN/3G handovers: a case study , 2007, MOCO.