移动IPv6网络安全移动性管理技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,Internet网络互联技术和移动通信技术的高速发展带动了以IP技术为核心的移动互联网的发展。移动IPv6技术以其出色的移动性支持成为移动互联网首选组网协议。然而,移动网络环境的开放性、拓扑的动态性使得移动IPv6网络面临诸如中间人攻击、DoS攻击等各种安全威胁,而且在移动切换、数据传输等通信过程中移动IPv6协议并未提供任何安全保护措施,移动IPv6网络安全问题十分突出。此外与移动性相关的移动IPv6切换及注册绑定更新等过程引发的延时问题严重影响了网络的整体性能,进而影响了用户获取的服务质量。因此,研究移动IPv6网络环境下的安全移动性管理技术具有重要的理论意义和应用价值。本文对此展开了深入研究。
     本文首先深入分析了移动IPv6网络安全管理机制、移动IPv6切换管理与性能优化、移动IPv6子网安全与切换性能以及多宿移动子网的流量控制问题;然后设计了一套面向MIPv6网络的IP层安全架构,并基于该安全架构对MIPv6网络、移动子网以及多宿移动子网中的安全移动性管理技术进行了深入研究,提出了解决方案。本文的主要研究内容和成果如下:
     1.针对MIPv6网络移动性管理中的安全问题,基于对IPv6内嵌的IPSec协议的扩展,提出了一套MIPv6网络的IP层安全架构——MIPSec协议。该协议主要从业务流协议安全增强、安全策略优化、移动性的上下文支持、认证协议增强与扩展等几个方面做了设计和改进,使改进的协议不仅能够满足MIPv6网络移动性产生的安全需求,而且也为MIPv6通信提供了端到端的安全保护,有效抵抗各类网络攻击。
     2.针对MIPv6切换过程引入安全机制导致的延时过大的问题,提出了一种融合认证机制的安全快速的MIPv6切换方法。该方法在MIPSec安全架构下,利用FMIPv6切换信令,融合认证信息,实现切换与认证并发执行,消减了安全切换过程的复杂性,大大降低了接入认证给移动切换过程带来的延时开销。
     3.针对移动子网(NEMO)切换过程中的安全和性能问题,提出了安全异步切换方法。移动网络基本协议中采用网络嵌套结构和隧道机制来处理移动切换问题,除了移动路由器本身的切换延时,网络嵌套结构带来的迂回路由过程以及额外的认证过程使切换延时进一步增大,服务质量下降。本文充分考虑了移动网络特点,提出了移动子网移动路由器与移动网络节点分离的安全异步切换方法。该方法利用融合认证机制的快速切换方法实现移动路由器切换,使用授权前缀机制实现路由优化以及移动网络内节点切换。与基本NEMO协议相比,该方法不但实现了路由优化,而且能够保障安全性,并降低切换延时。
     4.多宿移动子网是为了提高移动子网可靠性而提出的一种移动网络结构,该网络可以拥有多个移动路由器,本文针对此类网络中路由器选择存在单点失效而导致的安全及流量不均衡导致网络拥堵问题,提出了一种基于信任的多宿移动子网安全路由选择方法。该方法基于多属性决策理论建立节点主观信任模型,并对每个移动路由器节点进行信任值评估,移动网络节点在进行接入路由器选择时,依据信任值最高者择优选择,从而避免了单点失效问题,增强安全性,均衡了网络流量,提高了网络整体性能。
In recent years, the rapid development of Internet technology and mobilecommunication technology promote the development of IP based mobile Internettechnology. Mobile IPv6technology becomes the preferred networking protocols ofmobile Internet for its excellent mobility support. However, the openness for mobileenvironment and dynamic topology makes MIPv6network suffer from serious securitythreats, such as man-in-middle attack, DoS attack and so on. On the other hand, MIPv6protocol does not provide any security protection for mobile handover and datatransmission process. As a result, security problem in MIPv6network is veryconspicuous. Moreover, the mobility management such as handover and binding updateprocess of MIPv6caused by its dynamic topological structure degrade the overallnetwork performance, which affects the QoS of the network further. Hence, it is of greatsignificant to research secure mobility management technology of MIPv6networktheoretically and practically.
     In this thesis, security mechanisms in MIPv6network, MIPv6handovermanagement and performance optimization, the security and handover performance ofmobile network, traffic control of multi-homed mobile network are analyzed firstly.Then a security framework in IP layer is designed for MIPv6network, and securemobility management issues such as handover for node and mobile network, routingselection in multi-homed mobile network are studied in-depth based on this securityarchitecture. Main content and contributions in this paper are summarized as follows:
     1. A novel mobile IPsec protocol (MIPSec) for MIPv6network environment isproposed to solve the security issues for MIPv6network mobility management. MIPSecis a new IP layer security architecture extended from IPSec protocol which is embeddedin IPv6. In the proposed protocol, several aspects are designed to improve MIPv6network security, including traffic protocols security enhancement, security policyoptimization, contextual support for mobility, authentication protocol enhancement andextension. Security analysis indicates that the proposed MIPSec can not only meet theneeds of MIPv6mobility, but also provide end to end security protection to resistagainst almost all kinds of attacks effectively.
     2. A secure fast MIPv6handover scheme is proposed to solve the handover delayissues caused by the introduction of security mechanisms in MIPv6. Based on MIPSecarchitecture, the scheme combines FMIPv6signaling and authentication information to achieve handover and authentication simultaneously, which diminishes the handovercomplexity and thus reduces its handover delay greatly.
     3. A secure asynchronous handover scheme is proposed to solve the secure andperformance issues caused by handover process of network mobility (NEMO). Nestednetwork architecture and tunneling mechanism are used to deal with handover problemsin NEMO basic protocol. As a result, triangle routing process caused by nestedarchitecture and extra authentication process may increase the handover delay anddegrade the quality of service further. To solve the problems, an asynchronous handoverscheme is proposed, in which handover of mobile router and inner nodes are carried outasynchronously, and routing optimization is considered as well. Compared with thebasic NEMO protocol, the proposed scheme can not only achieves route optimizationand guaranteed handover safety, but also reduces handover delay.
     4. Multi-homed mobile network is appeared in order to improve the reliability ofthe mobile network with more than one mobile router. A trusted based routing selectionalgorithm in IPv6multi-homed mobile networks is proposed to avoid overloadingproblem caused by the concentration of a large quantity of data in a few mobile routers.The proposed algorithm establishes a multi-attribute decision model by introducingmultiple decision attribute information, and uses the combination weighting method tocalculate the trust value of each router. A mobile node can access to an optimal mobilerouter to avoid single point of failure problem and balance network traffic, thus improveoverall network performance and security.
引文
[1] Perkins C.. IP Mobility Support. RFC2002, October1996
    [2] Hanks S., Li, T, Farinacci, D., and P. Traina. Generic Routing Encapsulation. RFC1701, NetSmiths, Ltd., and cisco Systems, October1994
    [3] Perkins C.. IP Encapsulation within IP. RFC2003, October1996
    [4] Perkins C.. Minimal Encapsulation within IP. RFC2004, October1996
    [5] Solomon J.. Mobile IP Protocol Applicability Statement. RFC2005, October1996
    [6] D. Cong&M. Hamlen, C. Perkins, The Definitions of Managed Objects for IPMobility Support using SMIv2.RFC2006,October1996
    [7] C. Perkins, D. Johnson, J. Arkko, Mobility Support in IPv6, IETF RFC3775,2004.
    [8] Castelluccia C. HMIPv6: A Hierarchical Mobile IPv6Proposal. ACM MobileComputing and Communications Review,2000(1):48-59
    [9] S Hwang S.H., Fe B.K., Han Y.H., et al. An Adaptive Hierarchical mobile IPv6withroute optimization,57th IEEE Semiannual Vehicular Technology Conference.Korea,2003
    [10] Vhldi I., Ali B. M., Habaebi H., et al. Routing Scheme for Macro MobilityHandover in Hierarchical Mobile IPv6Network,4th National Conference onTelecommunication Technology. Malaysia,2003.
    [11] Soliman H, Castelluccia C, Malki K. E., et al. Hierarchical Mobile IPv6MobilityManagement. IETF RFC4140, Aug.2005
    [12] Koodli R. Fast Handovers for Mobile IPv6. IETF Internet Draft:draft-ietf-mobileip-fast-mipv6-05, Sep.2002
    [13] Sulander M., Hamalainen T., Viinikainen A., et al. Flow Based Fast HandoverMethod for Mobile IPv6Network, IEEE59th Semiannual Vehicular TechnologyConference. Los Angeles,USA,2004
    [14] Gwon Y., Yegin A.. Enhanced Forwarding from the Previous Care-of Address(EFWD) for Fast Handovers in Mobile IPv6, IEEE Wireless Communication andNetworking Conference. Atlanta, USA,2004
    [15] Eu Y. C., et al. Multicast Based and Fast Handover Scheme in Mobile IPv6Wireless Network, IEEE International Workshop on Antenna Technology: SmallAntennas and Novel Meta materials.2005
    [16] Li R, Li J. An Enhanced Fast Handover Scheme for Mobile IPv6, ACMInternational Wireless Communications and Mobile Computing Conference.Vancouver, Canada,2006
    [17] Koodli R. Fast Handovers for Mobile IPv6. IETF RFC4068,2005
    [18] Young J. H., Soliman H., et al. Fast Handover for Hierarchical MIPv6(F-HMIPv6).IETF Internet draft: draft-jung-mipshopfhmipv6-00, Apr.2005
    [19] Jordan N, Poropatich A, Fleck R. Link Layer Support f or Fast M obi le IPv6Handover in Wireless LAN based Networks,13th IEEE Work shop on Local andMetropolitan Area Networks. Mill Valley, USA,2004
    [20] Park B, Latchman H A. Fast Handover Scheme Based on Enhanced Access Point(EAP) for Mobile IPv6, IEEE International Conference on AdvancedCommunication Technology. Korea,2006
    [21] Shim M, Kim H, Lee S. A Fast Handover Mechanism for IPv6Based WiBroSystem, IEEE8th International Conference on Advanced CommunicationTechnology. Phoenix Park, Korea,2006
    [22] An Y, Yae B, Lee K, et al. Reduction of Handover Latency Using MIH Services inMIPv6, IEEE International Conference on Advanced Information Networking andApplications. Vienna,Austria,2006
    [23] McCann P. Mobil e IPv6Fas t Handovers f or802.11Networks. IETF RFC4260,Nov.2005
    [24] Arkko J, Devarpalli V, Dupont F. Using IPsec to Protect Mobile IPv6Signalingbetween Mobile Nodes and Home Agents. IETF RFC3776, June2004
    [25] Nikander P, Aura T, Arkko J, et al. Mobile IPv6Route Optimization SecurityDesign Background. IETF RFC4225, Dec.2005
    [26] Ying Qiu, Jianying Zhou, Feng Bao, Protecting All Traffic Channels in MobileIPv6Network, Proc. of IEEE Wireless Communications&Networking Conference(WCNC’04), March2004
    [27] Robert H. Deng, Jianying Zhou, Feng Bao, Defending Against Redirect Attacks inMobile IP, ACM CCS’02, November2002
    [28] Patel, K. Leung, M. Khalil, H. Akhtar, K. Chowdhury, Authentication Protocol forMobile IPv6, IETF RFC4285, January2006
    [29] Liu Changwen, Soliman H. Local key exchange for mobile IPv6local bindingsecurity association, IEEE59th Vehicular Technology Conference. Los Angeles,USA,2004
    [30] T. Aura, Cryptographically Generated Addresses (CGA), IETF RFC3972, March2005
    [31] Lee J-H, Chung T-M. Performance Evaluation of Dual Authentication Scheme inMobile IPv6Networks, IEEE International Conference on Systems and NetworksCommunications.2006
    [32] Yoon H.S., Kim R.H., Hong S.B., et al. PAK based Binding Update Method forMobile IPv6route optimization, IEEE International Conference on HybridInformation Technology,2006
    [33] Ryu S, Mun Y. An Optimized Scheme for Mobile IPv6Handover betweenDomains Based on AAA, IFIP International Conference on Embedded andUbiquitous Computing.2006
    [34] Le F, Patil B, Perkins C E, et al. Diameter mobile IPv6application. Internet IETFDraft: draft-le-aaa-diameter-mobileipv6-04,Nov.2004
    [35] Wei Da, Liu Yanheng, Yu Xuegang, et al. Research of Mobile IPv6ApplicationBased On Diameter Protocol, International Multi Symposiums on Computer andComputational Sciences.,2006
    [36] Patel, K.L., M. Khalil, H. Akhtar, K. Chowdhury, Mobile Node Identifier Optionfor MIPv6,RFC4283. November2005
    [37] Greg O'Shea, M.R., Child-proof authentication for MIPv6(CAM). ACMSIGCOMM Computer Communication Review, April2001.31(2).
    [38] Hyungmo Kang and Youngsong Mun, Authentication in Fast Handover of MobileIPv6Applying AAA by Using Hash Value, MSN2005, LNCS3794, pp.815–824.
    [39]田野,基于身份密码学的MIPv6安全切换研究,中国科学院研究生院博士学位论文,2006
    [40]李军,支持AAA的移动IPv6网络切换性能研究,中国科学院研究生院博士学位论文,2006
    [41] G. Giaretta, J. Kempf, V. Devarapalli, Mobile IPv6bootstrapping in split scenario,working in progress.
    [42] Jeong J, Lee K, Park J, et a1. Route Optimization Based on ND Proxy for MobileNodes in IPv6Mobile Network.IEEE59th Vehicular Technology Conference(VTC), Italy,2004.
    [43] Calderon M, Bernardos C, Bagnulo M. Design and Experimental Evaluation of aRoute Optimization Solution for NEMO. IEEE Journal on Selected Areas inCommunications,2006,24(9):1702-1716.
    [44]苏伟,张宏科.一种移动网络中的路由优化模型.电子学报,2007,35(7):1217-1222.
    [45] B.Y.Kim, K.J.Lee, J.S.Park, H.J.Kim, Hierarchical prefix delegation protocol forinternet protocol version6(IPv6), IETF draft-bykim-ipv6-hpd-01.txt,2004.
    [46] B. Haberman and J. Martin, Automatic prefix delegation protocol for internetprotocol version6(IPv6), draft-haberman-ipngwg-auto-prefix-02.txt,2002.
    [47] K. Lee, J. Park, and H. Kim, Route optimization for mobile nodes in mobilenetwork based on prefix delegation, IEEE58th Vehicular Technology Conference,2003, pp.2035-2038.
    [48] Kwon T, Cho H, Choi Y, Route optimization using tree information option fornested mobile networks. IEEE Journal on Selected Areas in Communications,2006,24(9):1717-1724.
    [49] Kuo GS, Jik, Novel hierarchical network mobility support protocol withbidirectional end to end route optimization solution for nested mobile networks.IEEE Globe Com’06.2006:1-6.
    [50] Thuber P, Molteni M. IPv6reverse routing header and its application to mobilenetworks. IETF draft-thubert-nemo-reverse-routing-header-05.txt,2005.
    [51] Han-Kyu Ryu et al., Improved handoff scheme for supporting network mobility innested mobile networks. Lecture Notes in Computer Science,2005,3480(I):378-387.
    [52] Ying-Hong Wang, Kuo-feng Huang, Hsin-Yi Ho. A seamless handover schemewith pre-registration in NEMO.2009International Conference on AdvancedInformation Network and Applications Workshops.2009, pp338-344.
    [53] Rho, Kyung-Taeg et al., AHS: Advanced handoff scheme for nested mobilenetworks. Journal of Information Science and Engineering,2008,24(1):221-236.
    [54] Choi N,Ryu J,Paik E.A Transparent Failover Mechanism for a Mobile Networkwith Multiple Mobile Routers.IEEE Communication Letter,2007,11(7):604-606.
    [55] Lin H,Labiod H.Hybrid Handover Optimization for Multiple Mobile RoutersBased Multihomed NEMO Networks, IEEE International Conference on PervasiveSenrices(ICPS),2007.
    [56] Tan T. K., Samsudin A., Efficient NEMO Security Management via CA-PKI, IEEEInternational Conference on Telecommunications and Malaysia InternationalConference on Communications, May2007, pp.140-144.
    [57] Fathi H., Shin S., Kobara K.,et al.LR-AKE-based AAA for Network Mobility(NEMO) Over Wireless Link.IEEE Journal on Selected Areas in Communication,2006,24(9):1725-1737.
    [58] Fathi H., Shin S., Kobara K., Imai H., Secure AAA and Mobility for Nested MobileNetworks, Telecommunications,2007. ITST '07.7th International Conference onITS, June2007,pp6
    [59] P. Georgopoulos, B. McCarthy, Christopher Edwards, A Collaborative AAAArchitecture to Enable Secure Real-World Network Mobility, Networking2011,Part I, LNCS6640, pp.212–226
    [60]田野,张玉军,张翰文,等.移动IPv6网络基于身份的层次化接入认证机制.计算机学报,2007,30(6):905-915.
    [61]黄松华,孙玉星,黄皓,等.支持路径选择和快速切换的移动网络接入路由器安全Mesh.计算机学报,2009,32(3):531-542.
    [62] Politis C,Chew K,Akhtar N,et a1.Hybrid Multi-layer Mobility Management withAAA Context Transfer Capabilities for a11IP Networks. IEEE WirelessCommunications,2004,11(4):76-88.
    [63] Paik E,Cho H,Kwon T,et a1.Mobility-aware Mobile Router Selection andAddress Management for Ipv6Network Mobility.ACM Network and SystemsManagement,2004,12(4):485-505.
    [64] Draves R,Thaler D.Default Router Preferences and More Specific Routes.RFC4191,IETF,2005.
    [65] Paik E, Cho H, Ernst T, et a1.Load Sharing and Session Preservation with MultipleMobile Routers for Large Scale Network Mobility.ACM/IEEE InternationalConference on Advanced Information Networking and Applications (AINA),2004.
    [66] Tsukada M,Ernst T,Wakikawa R.Dynamic Management of Multiple MobileRouters.IEEE International Conference on Networks(ICON),2005.
    [67] Cho S, Na J, Kim C. A Dynamic Load Sharing Mechanism in Muhihomed MobileNetworks. IEEE International Conference on Communications(ICC),2005:1459-1463.
    [68] Faizan, J., H. El-Rewini, M. Khalil, Introducing reliability and load balancing inmobile IPv6-based networks, Wireless Communications and Mobile Computing,2008,8(4):483-500.
    [69] Faizan, J., H. El-Rewini, M. Khalil. Efficient dynamic load balancing for multiplehome agents in Mobile IPv6based networks. International Conference on PervasiveServices, IEEE,2005:178-187.
    [70] Jue, J., Ghosal, Dipak, Design and analysis of a replicated server architecture forsupporting IP host mobility, Cluster Computing,1998,1(2):249-260.
    [71] Vasilache, A., J. Li, H. Kameda, Threshold-Based Load Balancing for MultipleHome Agents in Mobile IP Networks. Telecommunication Systems,2003,22(1):11-31.
    [72] Hui Deng, X.H., Kai Zhang, Zhisheng Niu, Masahiro Ojima, A hybrid load balancemechanism for distributed home agents in mobile IPv6, in The14Ih IEEE2003International Symposium on Personal, Indoor and Mobile Radio CommunicationProceedings.2003, IEEE. p.5.
    [73] Kim W, Jang J, Park J, et a1. Fault Tolerant Mechanism in Dynamic Multi-HomedIpv6Mobile Networks.ACM/IEEE International Conference on Multimedia andUbiquitous Engineering(MUE),2007.
    [74] Mitra, S. and S. Pyne, Fuzzy logic based route optimization in a multihomedmobile networks. Wireless Networks,2011,17(1):213-229.
    [75]黄松华,梁维泰.网络移动无缝切换机理研究.中国电子科学研究院学报.2013,8(3):275-280
    [76] Yan Z. A Conceptual Architecture of a Trusted Mobile Environment.IEEEInternational Workshop on Security,Privacy and Trust in Pervasive and UbiquitousComputing (SecPerU), France,2006.
    [77] Sen J, Chowdhury P, Sengupta. A Distributed Trust Establishment Scheme forMobile Ad Hoc Networks. IEEE International Conference on Computing: Theoryand Applications(ICCTA), Kolkata, India,2007.
    [78] Balakrishnan, Varadharajan V, Tupakulau. TEAM: Trust Enhanced SecurityArchitecture for Mobile Ad Hoc Networks. IEEE International Conference onNetworks(ICON),Adelaide, Australia,2007.
    [79] Chen L, Zhang H, Zhang L. A New Information Measurement Scheme Based onTPM for Trusted Network Access. IEEE International Conference onComputational Intelligence and Security (CIS), China,2007.
    [80] R.Moskowitz, P.Nikander. Host identity protocol (HIP) Architecture. RFC4423,May2006.
    [81] Kent, S. and R. Atkinson. IP Authentication Header. RFC2402, November1998
    [82] Kent, S. and R. Atkinson. IP Encapsulating Security Payload (ESP). RFC2406,November1998
    [83] Maughan, D., Schertler, M., Schneider, et al. Internet Security Association and KeyManagement Protocol (ISAKMP). RFC2408, November1998
    [84] D.H arkins, D.C arrel. The Internet Key Exchange(IKE).RFC2409, November1998
    [85] Moy, J., Ferguson, D., and R. Coltun. OSPF for IPv6.RFC2740, March1997
    [86] G. Malkin,R. Minnear. RIPng for IPv6.RFC2080,January1997
    [87]韩旭东,汤隽,郭玉东.新一代IPSec密钥交换规范IKEv2的研究.计算机工程与设计.2007,28(11):2549-2552,2558.
    [88]曹春杰,张帆,马建峰.可证安全的Intemet密钥交换协议.武汉大学学报:理学版.2006,52(5):545—549.
    [89] Brainard, A.J.a.J. Client Puzzles: A Cryptographic Countermeasure AgainstConnection Depletion Attacks, Proceedings of NDSS '99(Networks andDistributed Security Systems),1999, pp.151-165.
    [90] Q. Dong, L. Gao and X. Li, A new client-puzzle based DoS-resistant scheme ofIEEE802.11i wireless authentication protocol, The3rd International Conference onBiomedical Engineering and Informatics,2010, pp.2712-2716.
    [91] M. Bellare, Ran Canetti, Hugo Krawczyk, A modular approach to the design andanalysis of authentication and key-exchange protocol, Proceedings of the ThirtiethAnnual ACM Symposium on Theory of computing,1998, pp.419-428.
    [92] Ran Canetti, Hugo Krawczyk. Analysis of key-exchange protocols and their use forbuilding secure channels, International Conference on the Theory and Applicationof Cryptographic Techniques,2001, pp.453-474.
    [93] Ran Canetti, Hugo Krawczyk, Security analysis of IKE’s signature-basedkey-exchange protocol,22nd Annual International Cryptology Conference,2002,pp.143-161.
    [94]高翔,李亚敏,郭玉东,马红途. IKEv2协议安全性分析与改进.计算机应用.2005,25(3):563-564,572.
    [95]陈炜,龙翔,高小鹏.一种用于移动IPv6的混合认证方法,软件学报,2005,16(09):1617-1624.
    [96] S.Yoo, D.Choi, H.Kim and S.Son. Authentication mechanism of mobile IPv6overwireless LAN in diameters. International Conference on Communications inComputing (CIC),2003.
    [97] C.Kim, YS.Kim, EN.Huh and Y.Mun. Performance improvement in mobile IPv6using AAA and fast handoff. International Conference on Computational Scienceand Its Applications (ICCSA2004). LNCS3043, Heidelberg: Springer-Verlag,2004.738~745.
    [98]李俊,葛敬国. NEMO移动网络及其路由优化技术.计算机科学.2006,33(6):25-28.
    [99]石东海,唐朝京,张尔扬.基于动态家乡代理的NEMO路由优化.浙江大学学报(工学版).2008,42(2):344-348.
    [100]杨水根,秦雅娟,周华春,张宏科.基于身份与位置分离的嵌套移动网络路由优化机制.电子学报.2008,36(7):1261-1267.
    [101] M. Calderon, C. Bernardos, M. Bagnulo, I. Soto, A. de la Oliva, MIRON: mobileIPv6route optimization for NEMO, IEEE Journal on Selected Areas inCommunications.2006,24(9):1702–1716.
    [102]陈晓华,周华春,秦雅娟,张宏科.嵌套移动子网路由优化方案与性能分析.北京交通大学学报.2008,32(5):54-59.
    [103] Dinakaran M, Dr. P. Balasubramanie. A Route Optimization technique for NestedNEMO.2009IEEE International Advance Computing Conference.2009:697-701.
    [104]黄松华,丁峰,黄皓.支持负载均衡和路由优化的网络移动增强协议.东南大学学报(自然科学版).2010,40(1):35-40.
    [105] H.J. Lim, M. Kim, J.H. Lee, T. M. Chung. Route Optimization in Nested NEMO:Classification, Evaluation, and Analysis from NEMO Fringe Stub Perspective.IEEE Transactions on mobile computing,2009,8(11):1554-1572.
    [106] Chung-Sheng Li, Fred Lin, Han-Chieh Chao. Routing optimization over networkmobility with distributed home agents as the cross layer consideration.Telecommunications System.200942:63–76.
    [107] Abu Zafar, M. Shahriar, Mohammed Atiquzzaman, William Ivancic. RouteOptimization in Network Mobility: Solutions, Classification, Comparison, andFuture Research Directions. IEEE Communications Surveys&Tutorials.2010,12(1):24-38.
    [108] Wei, S. and Z. Hong-ke, A Route Optimization Model in Mobile Network. ActaElectronica Sinica,2007.35(7): p.1217-1222.
    [109] S. Pack, T. Kwon, Y. Choi, E.K. Paik. An Adaptive Network Mobility SupportProtocol in Hierarchical Mobile IPv6Networks. IEEE Transactions on VehicularTechnology,2009,58(7):3627-3639.
    [110] Sang-Jo Yoo, cSeung-Joon Choi, Dong Su. Analysis of Fast HandoverMechanisms for Hierarchical Mobile IPv6Network Mobility. Wireless PersonCommunications.2009,48:215–238.
    [111] Md. Shohrab Hossain, Mohammed Atiquzzaman, William Ivancic, PerformanceEvaluation of Multihomed NEMO, IEEE ICC2012Wireless NetworksSymposium,2012:5429-5433.
    [112] Houda Labiod, Hai Lin, Riccardo Nonni, Analytical study of intradomainhandover in multiple-mobile-routers-based multihomed NEMO networks,Computer Networks,2010,54:3280–3294.
    [113] Hai Lin, Houda Labiod, Hybrid Handover Optimization for Multiple MobileRouters-based Multihomed NEMO Networks,2007:136-144.
    [114] Lu Li-Hua, Liu Yuan-An, Wang Qiu-Tian,Mobility Management for MultihomedMobile Networks using Backup Registration
    [115]任彦,苏伟,张思东,张宏科,列车移动网络关键技术的研究,铁道学报,2006,28(1):121-124.
    [116]董平,张宏科,基于多家乡技术的列车移动网络研究,铁道学报,2009,31(2):49-53.
    [117] IEEE Standards Department. IEEE Medium Access Control (MAC) SecurityEnhancements. P802.11i/D4.1, July2003.
    [118]宽带无线IP标准工作组. WAPI实施指南.2006年1月
    [119] Ernst T., Network Mobility Support Goals and Requirements, RFC4886, July2007.
    [120] Rohini B., Bhaskar S., Security in Network Mobility (NEMO): Issues, Solutions,Classification, Evaluation, and Future Research Directions, Network Protocolsand Algorithms,2013,5(3):87-111.
    [121] Conta A. and Deering S., Generic Packet Tunneling in IPv6Specification, RFC2473. December1998.
    [122] Devarapalli V., Dupont F., Mobile IPv6operation with IKEv2and the RevisedIPSec Architecture, RFC4877, April2007
    [123] Ng C. and Hirano J., Extending Return Routability Procedure for Network Prefix(RRNP), IETF draft-ng-nemo-rrnp-00, October2004.
    [124] Kukec, M. Bagnulo, A. de la Oliva, CRYPTRON: CRYptographic prefixes forroute optimization in NEMO, IEEE International Conference on Communications,2010:1–5.
    [125] Krawczyk H., Bellare M. and Canetti R., HMAC: Keyed-Hashing for MessageAuthentication, RFC2104, February1997.
    [126] Ferguson P. and Senie D., Network Ingress Filtering: Defeating Denial of ServiceAttacks which Employ IP Source Address Spoofing, RFC2827, May2000.
    [127] Kent S., IP Encapsulating security Payload, RFC4303, December2005.
    [128] Tan T.K. and Samsudin A., Fast and simple NEMO authentication via RandomNumber, IEEE International Conference on Telecommunications and MalaysiaInternational Conference on Communications, May2007, pp.266-271.
    [129] Tan T.K., Samsudin A., PKI and Secret Key Cryptography Implementation forNEMO Security, International Conference on Computer and CommunicationEngineering,2006, pp.168.
    [130] Li L.S., Tzeng S.S., Bai R.C., Li M. T., End to End Security and Path Security inNetwork Mobility,40th International Conference on Parallel ProcessingWorkshops,2011, pp.16-21.
    [131] K. Ren, W. Lou, K. Zeng, F. Bao, J. Zhou, R.H. Deng. Routing optimizationsecurity in mobile ipv6, Computer Networks,2006,50:2401–2419.
    [132] J.D. Koo, S.H. Oh, D.C. Lee, Authenticated route optimization scheme fornetwork mobility (nemo) support in heterogeneous networks, InternationalJournal of Communication Systems,2010,23:1252–1267.
    [133] Christian Bauer. A Secure Correspondent Router Protocol for NEMO RouteOptimization, Computer Networks,2013,57:1078–1100.
    [134] Donghai Shi, Chaojing Tang, A Fast Handoff Scheme Based on LocalAuthentication In Mobile Network,20066th Intertional Conference on ITSTelecommunications Proceedings,2006, pp.1025-1028.
    [135] Ming-Chin Chuang, Jeng Farn Lee, LMAM: A Lightweight MutualAuthentication Mechanism for Network Mobility in Vehicular Networks,2008IEEE Asia-Pacific Services Computing Conference.2008, pp.1611-1616.
    [136] Shahriar, Abu Zafar M. Hossain, M. Atiquzzaman. A Cost Analysis Frameworkfor NEMO Prefix Delegation-Based Schemes, IEEE Transactions on MobileComputing,2012,11(7):1192-1206.
    [137] Shahriar, Abu Zafar M. Qureshi, Rehan; Atiquzzaman, Mohammed. Performanceof Prefix Delegation-Based Route Optimization Schemes for NEMO. WirelessPersonal Communications,2011,56(3):469-490.
    [138] B.Y Kim, Y. Lee, J.S. Park, H.J. Kim. Hierarchical Prefix Delegation Protocol forInternet Protocol Version6(IPv6). IETF draft-bykim-ipv6-hpd-01, February2004.
    [139]朱斌,曾孝平,陈礼,廖红云,颜芳.自适应负载均衡路由算法研究.西安电子科技大学学报(自然科学版).2011,38(5):101-107
    [140]王楷,邓仲芬,石为人,王小刚.基于多属性决策的WSNs分布式能量均衡路由.仪器仪表学报.2012,33(4):955-960.
    [141]史琰,刘增基,盛敏.一种保证负载均衡的网络资源分配算法.西安电子科技大学学报(自然科学版),2005,32(6):885-890.
    [142]曾加,慕春棣,李戍.基于多属性决策的无线传感器网络路由算法.系统仿真学报.2009,21(3):878-881,887.
    [143]徐玖平,吴巍.多属性决策的理论与方法.北京:清华大学出版社,2006.
    [144] Tarik Taleb, Tasuku Suzuki, Nei Kato, and Yoshiaki Nemoto, A Dynamic andEfficient MAP Selection Scheme for Mobile IPv6Networks, In Proceedings of
    IEEE Global Telecommunications Conference,2005, pp.2891-2895.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700