The present invention relates to a method of supporting mobility using a security tunnel, capable of supporting mobility through security connection between the inside and the outside of lower layers in different networks and of supporting the mobility of the lower layers.
The present invention is derived from researches performed as a part of the IT growth dynamic force technology development of the Ministry of Information and Communication and the Institute for Information Technology Advancement [subject management number: 2007-S-013-01 and subject title: development of a fixed-mobile convergence networking technology based on ALL IPv6].
Recently, due to development of a radio network, researches of connecting a terminal to a plurality of networks so that the terminal can get services while moving the plurality of networks are actively performed. For example, researches are performed so that a terminal having a WiFi interface and a WiBro interface moves between two different networks to use radio networks.
A method of setting a tunnel using a terminal having a plurality of communication interfaces and of changing the tunnel in accordance with a radio link state to support mobility in a client/server based IPv6 movement structure is provided.
However, such a method has a problem in that it is difficult to guarantee the mobility of an IPv6 terminal in an IPv4 network when IP versions are different. In addition, it is possible to guarantee mobility in a predetermined network, however, it is not possible to guarantee mobility between external networks.
In order to solve the above-described problems, it is an object of the present invention to provide a method of supporting mobility using a security tunnel, capable of providing mobility in a network and mobility to an external network while guaranteeing the security of a small network, of guaranteeing the security of a network using security connection, and of providing the mobility of a network so that it is possible to support mobility regardless of IP versions and that a network can move.
In order to achieve the objects, a method of supporting mobility using a security tunnel, comprises, when the terminal that receives services through a first tunnel moves in a first network comprising a mobility supporting apparatus for providing services to at least one terminal of the first network, the mobility supporting apparatus generating a second tunnel that is a standby tunnel in accordance with request of the terminal, comparing stability of the first tunnel of the terminal with stability of the second tunnel of the terminal, and, when the second tunnel is stable in comparison with the first tunnel, activating the second tunnel of the terminal and providing services to the terminal through the second tunnel.
A method of supporting mobility using a security tunnel of the first network in the second network, comprises, a mobility supporting apparatus connected to the first network that is a lower network of the second network, being connected to a mobility controlling server of the second network as a client, connecting the first network to the second network through a generated first tunnel to provide services, when the first network moves, requesting setup of a second tunnel that is a new tunnel for the first network to the mobility controlling server, and, when the second tunnel that is a standby tunnel is generated in response to the setup request and when the second tunnel becomes stable, activating the second tunnel and changing connection of the first network from the first tunnel to the second tunnel.
A method of supporting mobility of a terminal that moves between a first network and a second network in which the first network as a lower network is connected to the second network as an upper network, comprises, the terminal connected to the first network requesting tunnel setup for the second network in a state where the tunnel of the first network is maintained, changing connection setup to the tunnel of the second network before connection of the first network is cut off when the tunnel setup of the second network is completed, and, canceling the connection of the first network and transmitting and receiving data through the tunnel of the second network.
In the method of supporting mobility using a security tunnel according to the present invention, in an environment hierarchically constituted for a network core, it is possible to support mobility in a local network regardless of IP versions and it is possible for a terminal that moves to an external network to access a local network through security and authentication. Therefore, it is possible to continuously provide services and to improve convenience and efficiency in accordance with the use of services. In addition, since the mobility of a network is supported so that the network can move, it is possible to improve the services.
Hereinafter, embodiments of the present invention will be described with reference to the accompanying drawings.
Referring to
The mobility supporting apparatus 200 is positioned under the global network N that is an upper network and an external network so that mobility and services are controlled by the mobility controlling server 100 of the global network N. At this time, the global network N as an IPv4 based core network includes at least one networks having different connection processes and standards. The mobility of the terminal connected to the global network is guaranteed by the mobility controlling server 100 by movement between different networks. For example, the terminal can consist of a WiFi radio LAN network or a WiMax radio LAN network and other radio networks.
The mobility supporting apparatus 200 is positioned on the local network N2 formed of a plurality of networks to control the mobility services of a terminal 10. A fire wall 210 is provided to support security connection when the terminal 10 is positioned in the global network N that is an external network to access the local network N2.
The terminal 10 is connected to the local network N2 through one of the WiFi radio LAN network A1 or the WiMax network B1 among a plurality of networks and is connected to the global network through the mobility supporting apparatus 200. At this time, the network can include other kinds of networks than the radio LAN (WiFi), the WiMax, and the WiBro and is not limited to the above.
At this time, the terminal 10 includes the WiFi connection interface and the WiMax connection interface so that the terminal 10 can be connected to the WiFi radio LAN network A1 and the WiMax network B2.
The terminal 10 is connected to the WiFi network or the WiMax network using one of the interfaces of the terminal to be connected to networks when a power source is driven. At this time, the terminal 10 activates a connection interface for one network in accordance with the signal magnitudes of the networks to be connected to the corresponding network. Then, an IP is set and an active interface is driven to transmit tunnel setup request and to register mobility supporting information in the mobility supporting apparatus 200 through the generated tunnel.
The terminal 10 can change the connected network during the transmission of data using the tunnel, tries to be connected to a new network to be authenticated, and then, moves to another network by setting an IP and by generating a new tunnel. At this time, the mobility supporting apparatus 200 provides mobility so that the transmission of data used by the terminal 10 is continuously maintained.
Referring to
The mobility supporting apparatus 200 drives the mobility controlling server 100 and a security client 201 for security to receive a security key and drives the mobility controlling client 202 to generate a tunnel. At this time, the tunnel is managed by a network interface 203.
The mobility supporting apparatus 200 performs authentication for the terminal 10 that requests mobility services through an authenticating unit 205, distributes a key, allows connection, and sets security through a server function unit 204, and drives a mobility controlling server 206 to support the mobility services. In addition, a log information managing unit 307 manages the mobility log information of the terminal 10 for highly reliable services. In particular, when the terminal 10 sets a tunnel from another network, the terminal 10 is authenticated based on the log information and information on connection allowance and security setup.
Referring to
The mobility supporting apparatus 200 that received the tunnel generation request message stores (S430) requested terminal information and transmits a response message (S440) to generate a tunnel (S450).
The terminal 10 that received the tunnel generation response message registers current position information in the mobility supporting apparatus 200 through the generated tunnel using a binding update message (S460) and the mobility supporting apparatus 200 transmits a binding update response message as a registration result to the terminal 10 to completely register services for the active interface.
In addition, when the terminal 10 is moved, after a standby tunnel is activated (S480), a standby tunnel is registered (S500) through a tunnel generation message (S490) and registration is confirmed by the tunnel generation response message (S510).
When the active interface and the standby interface are normally registered and the terminal 10 starts to move (S520), the terminal 10 measures the signals of the active interface and transmits a movement request binding update message (S530) when it is determined that the standby interface is stable in comparison with the active interface and the mobility supporting apparatus 200 switches over the active interface and the standby interface (S540). The terminal 10 completes services (S550) by a service completion binding update message (S560) and the mobility supporting server 200 deletes the corresponding terminal information (S570) and the tunnel (S580).
Referring to
When a message is received from the terminal (S620), it is determined whether the received message is a tunnel generation request message or a binding update message (S630).
At this time, when it is determined that the message is the tunnel generation request message, it is determined whether information on the terminal 10 exists (S640). When the information on the previously stored terminal 10 does not exist, cache entry is generated to store information on the terminal 10 (S650).
After the information on the terminal 10 exists or is newly stored, an active tunnel for the terminal 10 is generated in accordance with the kind of a work to be performed or a standby tunnel is generated S660 and a message for the generation of the tunnel is transmitted to the terminal (S740).
On the other hand, when the received message is the binding update message (S670), it is determined whether a generated tunnel exists for the terminal (S680). When the terminal does not exist or when the tunnel for the terminal does not exist, a response message for an error is transmitted (S690 and S740).
When the terminal and the tunnel for the terminal exist, a hand-over process for the terminal is performed (S700). A lifetime for the terminal is checked so that, when the lifetime is 0 (S710), the tunnel set for the terminal is removed (S720) and that, when the tunnel for the terminal does not exist, cache entry for the terminal is deleted (S730) to transmit a response message (S740).
On the other hand, when the lifetime of the terminal is not 0, the lifetime is refreshed (S760), the tunnel is changed from being active into being standby or from being standby into being active (S770) to transmit a response message (S740).
On the other hand, since information on the terminal 10 is updated at uniform intervals, lifetime of each terminal is periodically checked (S650) and the lifetime is refreshed as described above to change the state of the tunnel or to delete the tunnel (S710 to S770).
Referring to
Here, the mobility within the local network is the same as the case of
The mobility supporting apparatus 200, in a case P11 of the terminal moving with maintaining the communication within the local network N2, maintains a continuous service such that a new standby tunnel T12 is pre-set while maintaining the active tunnel T13 with the local network N2 of the terminal 10 such that the original active tunnel T13 is changed into the pre-set standby tunnel T12 before the original active tunnel T13 is cut off.
Meanwhile, when a service request is received from the external global network N1, the mobility supporting apparatus 200 performs security and authentication of the terminal 10 requesting the service to guarantee the stability of service.
When a new movement P2-P1 of the terminal 10 occurs in the external global network N1, a new standby tunnel T11 is preset to perform authentication, and the prior active tunnel T12 is exchanged by the new standby tunnel T11.
Referring to
For example, if a local network is built in a train or a motor vehicle, the local network itself moves (P25), in this case, the mobility supporting apparatus 200 supports the mobility of the local network N12.
The mobility supporting apparatus 200 creates a tunnel as a mobility controlling client in the mobility controlling server 100, and supports the mobility service of the terminal 10 located in the local network N2.
When the local network N12 moves, the standby tunnel is created (T21) as the above-mentioned mobility controlling client, the current tunnel T22 is changed into the new tunnel (T21) to guarantee the service continuity (N12->N11) of the local network. In this case, although the local network is distinguished by a pre-movement N12 and a post-movement N11, it is noted that the location of the network only is changed but the local network is same.
Here, the terminal 10 is guaranteed with the mobility when moving P21-P22 and P23-P24 using the tunnel within the local network N12 regardless of the movement of the local network N12.
Referring to
In the mobility supporting apparatus 200, during the movement P35 of the local network, the terminal 10 moved into the external global network N1 acquires care-of address (hereinafter, referred to as CoA) for transmitting a message for demanding to create a tunnel changed due to the movement of a layer mobility supporting apparatus, and the tunnel is set from the external network to the local network N21 to which the local network has moved. In this case, although the local network is distinguished by a pre-movement N22 and a post-movement N21, it is noted that the location of the network only is changed but the local network is same.
Since the mobility supporting apparatus 200 works as a client of the mobility controlling server 100 of the global network N1, the tunnel is created by the mobility controlling server 100 and a new tunnel is created along with the movement P35 of the local network.
The mobility supporting apparatus 200 acquires a new CoA, and the terminal 10 moved (p34-P33) from the local network to the external global network cannot recognize the change CoA. However, since the mobility controlling server 100 manages the CoA of the mobility supporting apparatus as a client of the mobility controlling server 100 own, the terminal present in the external global network acquires a new CoA using the unique address, home address (HoA) of own mobility supporting apparatus 200 from the mobility controlling server 100. The message for demanding to create a tunnel is transmitted to the mobility supporting apparatus 100 through the acquired CoA as described above so that the tunnel is created. At that time, the terminal 10 acquires address by querying the CoA with respect to the unique address, HoA of the mobility supporting apparatus 200 to the mobility controlling server 100, and request to set the tunnel as described above.
Therefore, the method of supporting mobility using a secure tunnel not only supports mobility for the movement of the terminal within a local network and for the movement of the terminal between the local network and the external global network, but also provides mobility for the movement of the local network and the movement of the terminal during the movement of the local network, so that continuity of the service can be provided to the terminal.
As described above, the method of supporting mobility using a secure tunnel according to the present invention has been described with reference to the embodiment shown in the drawings, these are merely illustrative, and those skilled in the art will understand that various modifications and equivalent other embodiments of the present invention are possible. Consequently, the true technical protective scope of the present invention must be determined based on the technical spirit of the appended claims.
According to the present invention, using a standby tunnel and an active tunnel, it is possible to support mobility of a terminal within a local network regardless of IP versions and it is possible to support mobility during the movement of the local network. Therefore, it is possible to continuously provide services and to improve convenience and efficiency in accordance with the use of services.
Number | Date | Country | Kind |
---|---|---|---|
10-2007-0132815 | Dec 2007 | KR | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/KR2008/007047 | 11/28/2008 | WO | 00 | 6/17/2010 |