The present invention relates to the field of packet-switched communication. More particularly, the present invention relates to mobile nodes moving in packet-switched communication network.
Many devices today communicate with each other using the Internet Protocol (IP). In order to provide mobility support to mobile devices, the Internet Engineering Task Force (IETF) has developed the “Mobility Support in IPv6 (MIPv6)” (Non-patent Document 1). Basic mobility support is done in Non-patent Document 1 with an introduction of an entity at the home network known as a home agent (HA). Mobile nodes (MNs) register their care-of addresses that they obtain in foreign links with the home agents using messages known as Binding Updates (BU). This allows the home agent to create a binding between the home address (HoA), which is the long-term address obtained in the home link, and care-of address (CoA), which is the temporary address obtained in the access network, of the mobile node. The home agent is responsible to intercept messages that are addressed to the mobile node's home address, and forward the packet to the mobile node's care-of address using packet encapsulation (i.e. putting one packet as the payload of a new packet, also known as packet tunneling).
In addition to providing the basic mobility support, MIPV6 also has another mode where the MN is able to attain route optimization (RO) with certain correspondent nodes (CNs) that support route optimization. Route optimization is achieved by means of proving to the correspondent node that the mobile node identifier, which is the home address in MIPv6, is collocated with the actual location dependent care-of address. When MN provides this proof (by sending a BU message), CN can then route data packets to MN by using the care-of address as the destination address.
This collocation proof between the permanent address and location dependent address is provided by means of a procedure called the Return Routability (RR). The Return Routability (RR) procedure allows the correspondent node to ascertain that the home-address and care-of-address specified in a BU are indeed collocated. In essence, the RR procedure requires the mobile node to obtain two securely generated tokens from the correspondent node prior to sending it a BU. To initiate the RR procedure, the mobile node first sends the correspondent node two different messages: a Home-Test-Init (HoTI) message, and a Care-of-Test-Init (CoTI) message. The HoTI with the mobile node's home-address as the packet source is sent to the correspondent node via the home agent, and the CoTI with the mobile node's care-of-address as the packet source is sent directly to the correspondent node. The correspondent node, upon receiving the HoTI, will reply with a Home-Test (HoT) message that contains a security token, called the Home Keygen Token (HoK), encrypted based on the home address of the mobile node using a private key. The Home-Test (HoT) message will be sent to the home-address of the mobile node. Similarly, the correspondent node, upon receiving the CoTI, will reply with a Care-of-Test (CoT) message that contains a security token, called the Care-of Keygen Token (CoK), encrypted based on the care-of-address of the mobile node using a private key. The Care-of-Test (CoT) message will be sent to the care-of address of the mobile node. Once the mobile node receives both the HoT and CoT messages, it can send the correspondent node a BU containing an Authenticator. This Authenticator is an encrypted checksum of the BU using a key that is a concatenation of the HoK and CoK. In this way, when the correspondent node receives the BU, it can independently calculate the checksum and check that the checksum is identical to that carried in the Authenticator. This verifies that the care-of address and the home address specified in the BU are indeed collocated.
The security design background about this procedure was briefly explained in non-patent document 3. The aim of the RR security design was to overcome spoofing attacks and flooding attacks to some extent. Spoofing attack refers to an attack using some else's home address as its own home address and capturing the data flows of the victim. Flooding attack refers to an attack using someone else's care-of address as its own and flooding the victims network causing denial-of service.
Nevertheless, the RR procedure is still vulnerable to some attacks where the attacker is on the path between the home agent and the correspondent node. Any attacker at the above mentioned position can generate the RR related signaling and capture the session even after the attacker has moved away from the path between the HA and CN. To alleviate this so-called time shifting attacks, non-patent document 1 makes it mandatory that RR signaling should be performed frequently: the time between two return routability signaling should be at most seven minutes.
Although the above discussed high frequency repetitiveness is needed for the return routability procedure, it is still a very widely favored protocol for applications that do not require a very high security level. This is due to two reasons. Firstly, since there is no state maintenance required at CN associated with RR, it is simple and CNs can have simple configurations to support this protocol. Secondly, it is a lightweight protocol compared to other well-known security protocol, such as cryptographically generated addresses (CGA).
With the ever-increasing proliferation of wireless devices, it is foreseeable that a new class of mobility technology will emerge: network mobility, or NEMO, where a whole network of nodes changes its point of attachment in entirety. The IETF is currently developing a solution for network mobility as disclosed in Non-patent Document 2. Here, it is specified that the mobile router (MR) when sending BU to home agent, will specify the network prefix, which the nodes in the mobile network are using. These are specified using special options known as Network Prefix Options to be inserted into the BU. These allow the home agent to build a prefix-based routing table so that the home agent will tunnel any packets sent to destinations with these prefixes to the care-of address of the mobile router.
As far as the MN is concerned, MIPv6 fully solves the RO problem except for the inefficiencies associated with RR. Currently, there are lots of interests within the research community to increase the security level of RR signaling and to reduce the signaling overhead associated with RR, to reduce the hand-off delay in establishing RO, to reduce hand-off delay when binding with the home agents of the MN and to perform media independent handovers. There are some working groups in the IETF such as the Mobile IP Hand-off Signaling Optimization working group (MIPSHOP) and Mobility Optimizations working group (MOBOPTS) working on achieving reduced hand-off delay and optimized MIPv6 respectively. Apart from these problems with roaming MN, when MN and NEMO integrate, some of the above-mentioned problems are further aggravated. This is primarily due to nested tunneling issue in nested NEMO.
The NEMO working group is addressing all the issues associated with NEMO including the MN and mobile network integration issues. The main issues in MN and NEMO integrated scenarios are achieving end-to-end route optimization for the flows associated with the mobile node that require timely delivery of packets, reducing hand-off delay associated with MN, reducing packet losses due to hand-off, power saving mechanisms for roaming MN that may be limited with power resources and band-width efficiency mechanisms where the bandwidth usage for signaling is reduced as far as possible to save the scarce wireless resource. There are many drafts in the NEMO working group that address the RO problem for a MN in a NEMO environment. There are also some drafts that address the hand-off delay optimization and efficient signaling mechanisms. In this report, the primary focus is to discuss mechanisms that could possibly reduce hand-off delay, reduce MN power wastage, reduce hand-off signaling overhead and reduce wastage of scarce wireless bandwidth when possible.
When MN and NEMO are integrated, there are protocols that are currently very much discussed to reduce the hand-off delay. There is one such protocol called the Global HA-HA protocol which is discussed in the non-patent document 4. This protocol achieves reduced hand-off establishment delay at the home agent by means of proxy HAs. This protocol is extremely useful to achieve reduced hand-off signaling delay with the HAs and also achieve route optimization with a CN that particularly does not support route optimization mechanism. It is a very widely accepted fact that reduced hand-off delay can be obtained by hierarchical location management mechanisms that employ two levels of location dependent addressing and this is obtained by deploying mobility anchor points (MAPs). One of the traditional mechanisms that achieve this hierarchical location management is revealed in non-patent document 6 and is called the hierarchical MIPv6 protocol (HMIPv6). Only when the domain under the MAP changes or when the time between two consecutive RR reaches its threshold, a node needs to inform the CNs about its location attached to a MAP. Inside the MAP domain, MN needs to only update the MAP of its current local address configured from its access network. The primary motive here is to achieve reduced hand-off signaling overhead and reduced hand-off delay. As far as power saving of the MN and bandwidth efficiency is concerned, the savings is not very much. Nevertheless, since costly RR signaling to CNs is not directly tied to MN movement, it can be said that the MN power saving and bandwidth efficiency is also slightly improved with the HMIPv6 scheme when compared to MIPv6 scheme. The route optimization is not the primary motive in the HMIPv6 protocol.
Currently there is a new working group in the IETF called the Network-based Local Mobility Management (NetLMM) working group. The primary motive of this group is to provide local mobility management transparently to the roaming mobile node. Basically, when the mobile node enters a NetLMM domain, it configures a CoA from a prefix from the local mobility anchor (LMA) and registers with its CNs and HAs. After that, the MN is not aware of its change of access network and has a single care-of address in the NetLMM domain. The access router of the roaming MN registers the MN's CoA or MN's HoA and its own address at the local mobility anchor. This scheme was designed to further improve the standard HMIPv6 scheme. The main motive of NetLMM is to perform the location registration signaling inside the NetLMM domain via access routers so that the location update signaling originating from a roaming MN is reduced and MN's power efficiency can be increased. Furthermore, since access routers do local registrations, the access network of MN is not too congested with such local registrations and the bandwidth efficiency of the wireless access network of MN is increased. Furthermore, the location update signaling can be performed faster because the wireless media is not used for local registration.
When the MN is in a mobile network and roaming in the NetLMM domain, again there will be some signaling burden in the access network of MR as well as the NEMO network. Nevertheless, the signaling load is slightly reduced because NetLMM reduces the MR's signaling burden, as the MR is not aware that it is roaming or changing access networks inside the NetLMM domain. From the above discussion it is clear, a lot effort is given to reducing signaling load and reduced hand-off delay in addition to route optimization.
There can be a scenario where the MN enters a mobile network deployed in a car, train, ship or bus and be connected there for long periods of time. In such a case, although the care-of address of MN may not change for long periods, when MN uses the RR procedure for secured binding cache creation process at the CNs, it needs to perform RR signaling as often as mentioned previously (the maximum interval between two RR is seven minutes). Due to this, many problems arise. The primary problem is that this RR signaling originating from MN that is nested behind a single or multiple MRs has the tunneling overhead and tunneling delay problem. The signaling packets from a MN that is nested are usually tunneled and this causes the delay in establishment of the secured binding cache entry (BCE) at the CNs. Furthermore, these signaling packets have to traverse via the access network of the MN which is the NEMO network and the wireless access networks of one or a plurality of upstream MRs. This cause delays because wireless bandwidths are smaller and are prone to more losses due to the vulnerability of the wireless medium. Another problem is that if many MNs enter the mobile network at the same time and be attached to the mobile network for long periods, then their RR signaling packets may be time synchronized (RR signaling performed simultaneously for all the mobiles). This causes collisions of the RR signaling packets and if re-transmission is allowed, this further creates delay. Furthermore, roaming MNs can be having low power levels and they have to waste there energy resources on signaling that is not really involved with them changing the CoAs and hence can be a wastage. Finally, scarce wireless bandwidth associated with NEMO as well as the wireless access networks of the upstream MRs will be wasted for such signaling and this reduces the bandwidth efficiency of wireless networks. It is advantageous to have schemes that can reduce the RR signaling issues for such a scenario where the MN is nested in a mobile network for long periods of time.
In Patent Document 1, there is provided a method and a system where a proxy node in the Internet Service Provider (ISP) where the MN is currently in carries out the location registration signaling for a non-mobile IP aware node that has Mobile IP version 4 (MIPv4) implementations. Location registration via a proxy is done for a MN roaming and getting attached to different fixed access routers and it is not for the MN and NEMO interaction scenario. This method is such that the proxy agent locates the home agent and performs the BU at HA and also does the BU registration at CNs. Since it is a MIPv4 scheme, RR signaling is not used. The proxy-signaling agent will intercept all the signaling as well as the data packets and pass the data packets to the non-mobile IP aware node. The motive here is to give mobile IP features for a non-mobile IP node. The problems with this scheme is that this is not favored for a MN in a nested NEMO scenario because if the MIPv6 MN derives its prefix from the home network then the signaling proxy agent will have to look deeper into the multiple encapsulated packets to get the relevant signaling packets. Furthermore, the proxy-signaling agent has to intercept all the data packets for the non-MIP node and forward it to non-MIPv4 MN. This increases the processing load on the MIPv4 signaling proxy.
In Patent Document 2, there is provided a method where the foreign agent or the access router carries out the location registration signaling for the MN. For the scenario given in the document, the access router does location registrations at the MAP and the HA. The problem with this scheme is that it may not be ideally suited for a MN that is nested in a mobile network. This is because, the access router may not be able to inspect the RR signaling packets that may be encapsulated in multiple levels in proportion to the number of tunneling levels. Moreover, if the MN is moving fast then the access router needs to change and new signaling proxies may have to be re-assigned and consequently proxy transfer signaling will be high.
In Patent Document 3, there is given a method and a system where a router called the vehicle proxy location register (VPLR) that has MIPv6 implementations carries out the proxy location registration signaling for a MN that is embedded inside the vehicle and directly connected to the above mentioned VPLR. In this method, the VPLR informs the MN that it can carry out the proxy signaling. After that, the MN gives the BU packets to be sent to its CNs and HA. Then the VPLR will send these packets to MN's HA and CNs. The problem with this scheme is that it is not ideally suited for a nested NEMO environment. If one assumes that the VPLR is a MR, then the following problems will exist. The first issue is that, delay in RR and BU signaling due to congestion in the access network of MR when MR carries out simultaneous proxy signaling for many MNs. The second issue is that the proxy RR and proxy BU signaling packets still have to go through tunneling procedure (i.e. MR-HA tunnel). The third issue is that the bandwidth resources are wasted in MR's access link to support such signaling.
[Patent Document 1] Greis, M. and Faccin, S., “A method of providing mobile IP functionality for a non mobile IP capable mobile node and switching device for acting as a mobile IP proxy”, WIPO Patent International Publication number WO 2004/010669 A2, 29 January 2004.
[Patent Document 2] Patel, A., Leung, K. and Dommety, G., “Methods and Apparatus for achieving route optimization and location privacy in an IPv6 network”, WIPO Patent International Publication number WO 2006/012511 A1, 2nd Feb. 2006.
[Patent Document 3] Gotoh, F., Hamasaki, R. and Maeda, M., “Mobile Communication System with a Proxy Location Registration Option”, Patent International Publication number WO 2004/070997 A2, 19 Aug. 2004.
[Non-patent Document 1] Johnson, D. B., Perkins, C. E., and Arkko, J., “Mobility Support in IPv6”, Internet Engineering Task Force (IETF) Request For Comments (RFC) 3775, June 2004.
[Non-patent Document 2] Devarapalli, V., et. al., “NEMO Basic Support Protocol”, IETF RFC 3963, January 2005.
[Non-patent Document 3] Nikander, P., Arkko, J., et. al, “Mobile IP version 6(MIPv6) Route Optimization Security Design”, Vehicular Technology Conference, 2003.
[Non-patent Document 4] Thubert, P., Wakikawa, R., et. al., “Global HA HA protocol”, IETF Internet Draft: draft-thubert-nemo-global-haha-01.txt, Oct. 15, 2005.
[Non-patent Document 5] Raman V., et. al., “A protocol for network based Localized Mobility Management”, IETF Internet Draft: draft-raman-netlmm-protocol-00.txt, February 2006.
[Non-patent Document 6] Soliman, H., et. al., “Hierarchical Mobile IPv6 Mobility Management (HMIPv6)”, Internet Engineering Task Force (IETF) Request For Comments (RFC) 4140, August 2005.
From the discussion of the related arts it is clear that for the scenario where MN is nested behind a single or plurality of MRs and being attached to a particular NEMO network for long periods of time there is no single scheme that provides an efficient location management solution. All the related art schemes were designed for a single roaming MN and there was no particular design for MN and NEMO interaction scenario.
It is thus an object of the present invention to overcome or at least substantially ameliorate the afore-mentioned disadvantages and shortcomings of the related art. Specifically, it is an object of the present invention to achieve reduced location update signaling for MN that is nested inside a NEMO network for long periods, by delegating its signaling rights to some server in the fixed infra structure that can easily and efficiently capture the return routability (RR) packets and generate them without bypassing ingress filtering.
In order to achieve the foregoing object, according to the present invention, it is provided in a preferred embodiment of the present invention a system of communication nodes in a packet switched data communication network including one or more mobile nodes (MNs), one or more mobile routers (MRs), one or more home agents of the above said MNs and MRs and a signaling proxy server functionality which can be placed in any router, such that when MN is inside a NEMO or nested NEMO network for long periods the MN delegates its signaling rights to a router in the fixed network with the above mentioned signaling proxy functionality. The arrangement being such that this router/server with signaling proxy functionality is in the direct path of the care-of test packets from correspondent node (CN) and also this router can generate the care-of test init packets using MN's care-of address overcoming ingress filtering.
In a preferred embodiment of the present invention, the signaling proxy server mentioned previously has a specific functionality such that it sends return routability signaling to CNs as a true signaling proxy for the MN without the CN knowing about it. It also sends a proxy binding update (BU) to MN's home agent where the home agent may know that this BU is coming from a signaling proxy server. The signaling proxy server only does the location management signaling and the MN processes the data packets.
In another preferred embodiment of the present invention, the first step used for delegation mechanism is such that, the MN sends a delegation request to the MR to which it is directly attached. This delegation request message has the number of CNs MN is communicating with and the number of home agents the MN has.
In yet another preferred embodiment of the present invention, the second step used for delegation mechanism is such that, the MR can look into its delegated data base entries and decide on the number of CNs and HAs for which it can assign the signaling proxy server and informs these values to the MN via the delegation request reply. In this reply the MR may also inform the signaling proxy server's public key or some symmetric key.
In yet another further preferred embodiment of the present invention, the third step used for delegation mechanism is such that, the MN once it gets a positive reply from MR, will construct the delegation message to the signaling proxy server informed by the MR. In this delegation message, the MN attaches a certificate, MN's important home agent address, MNs other home agent addresses, MN's correspondent node addresses, and the delegation lifetime. The above mentioned certificate may have a value which is a cryptographic cipher created using MN's home address, MN's care-of address and the signaling proxy server's public key encrypted by the key MN shares with its HA.
In another preferred embodiment of the present invention, the method used by the signaling proxy server to send the proxy BU to MN's home agent is such that it sends the certificate given by MN, a signature and the delegation lifetime. The signature mentioned can be created using the signaling proxy server's private key.
In an alternate preferred embodiment of the present invention, the signaling proxy server previously mentioned can well be the home agent of the mobile access router of MN.
In a preferred embodiment of the present invention, a system comprising of NEMO basic type of MRs and MIPv6 type of MNs, where the above said MNs may well be nested behind one or a plurality of such MRs and using the delegation mechanism outlined previously and delegating the signaling rights to the mobile access router's home agent. It is assumed that the prefix of the care-of address given to CN is obtained from MN's access router's home network.
In a preferred embodiment of the present invention, a system comprising of MRs, MNs and the home agents of these in a global HA-HA overlay network, where the above said MNs may well be nested behind one or a plurality of such MRs and using the delegation mechanism outlined previously and delegating the signaling rights to the mobile access router's home agent. It is assumed that the prefix of the care-of address given to CN is obtained from MN's access router's home network.
In a preferred embodiment of the present invention, a system comprising of MRs, MNs in a NetLMM network, where the above said MNs may well be nested behind one or a plurality of such MRs and using the delegation mechanism outlined previously and delegating the signaling rights to the mobile access router's home agent. It is assumed that the prefix of the care-of address given to CN is obtained from MN's access router's home network.
In yet another preferred embodiment of the present invention, an apparatus associated with the signaling proxy server is such that it has a packet processing mechanism. The mechanism is such that if it receives a packet for MN to which it is a signaling proxy, it will further look at the mobility header. If there is a mobility header, then it will extract the relevant RR tokens. If there is no such mobility header it will process the packet normally.
In yet another preferred embodiment of the present invention, an apparatus associated with the home agent of MN is such that when it knows that its MN has delegated it signaling rights is such that, it will look at the destination address and if it is for such a MN and the packet has mobility header, it will tunnel it to the signaling proxy server address.
In an alternate preferred embodiment of the present invention, the signaling proxy server mentioned previously can well be a server that is placed throughout the ISPs and discovered using the care-of address of MN. An anycast address is constructed using the prefix of the care-of address to discover this server. The server can be discovered by the MN or by the MR, which is directly attached to the MN.
In a preferred embodiment of the present invention, a system comprising of MRs and MNs in a NEMO and HMIPv6 combined scenario, where the above said MNs may well be nested behind one or a plurality of such MRs and using the delegation mechanism outlined previously and using the CoA based discovery to locate the signaling proxy server. This is done by locating the server using an anycast address configured from the prefix of the care-of address given to the CN.
In a preferred embodiment of the present invention, a system comprising of MRs and MNs in a NetLMM scenario, where the above said MNs may well be nested behind one or a plurality of such MRs and using the delegation mechanism outlined previously and using the CoA based discovery to locate the signaling proxy server. This is done by locating the server using an anycast address configured from the prefix of the care-of address given to the CN.
In another preferred embodiment of the present invention, a system comprising of MRs and MNs in a Global HA-HA scenario, where the above said MNs may well be nested behind one or a plurality of such MRs and using the delegation mechanism outlined previously and using the CoA based discovery to locate the signaling proxy server. This is done by locating the server using an anycast address configured from the prefix of the care-of address given to the CN.
In yet another preferred embodiment of the present invention, a system comprising of MRs and MNs in a NEMO RO scenario, where the above said MNs may well be nested behind one or a plurality of such MRs and using the delegation mechanism outlined previously and using the CoA based discovery to locate the signaling proxy server. This is done by locating the server using an anycast address configured from the prefix of the care-of address given to the CN. This NEMO RO scenario is such that the care-of address given to CN is the top-level mobile router care-of address.
In yet another preferred embodiment of the present invention, the proxy BU signaling sent to the MN-HA disclosed can be done transparently to MN′HA.
The present invention has the advantage of reducing location update signaling for MN that is nested inside a NEMO network for long periods.
To overcome the discrepancies outlined in the background, the present invention describes a method where a signaling proxy in the fixed infrastructure is chosen such that RR and BU signaling associated with MN need not go via the wireless media, multiple tunnels and waste narrow wireless bandwidth in the access networks of the upstream MRs. Furthermore, the proxy signaling agent is chosen such that it can directly intercept Care-of test (CoT) message associated with RR and generate proxy care-of test initiation (CoTI) message to CN bypassing ingress filtering. Furthermore, the signaling proxy is chosen such that the proxy-signaling server need not be re-chosen even when the MN is moving. Basically, the signaling agent need not change although MN's NEMO or MN's nested NEMO is moving. This reduces the delegation-signaling overhead and possibly helps in attaining a long-term signaling proxying mode establishment. Another core aim of the invention is to be applicable in future possible core NEMO systems such as the NEMO NetLMM scenario, NEMO global HA-HA scenario, NEMO HMIPv6 scenario and NEMO RO scenario.
Here, the present invention will be disclosed or described by embodiments believed to be the most practical and best. However, it is obvious to those skilled in the art that various modifications can be made without departing from the concept of the present invention with regard to the details of design matters or parameters.
It is important to understand this signaling proxy server is chosen from those which can directly intercept RR packets that are sent to MN's CoA from CN. Direct interception means the care-of test (CoT) packets can be intercepted without any tunneling procedure and this implicitly means intercepting these packets via the shortest path. Furthermore, this signaling proxy is chosen such that one need not change this often because as it can be seen from
Once the server 90 gets the delegation message 203, it will construct the appropriate proxy BU message 204 to be transmitted to HA 40. This proxy BU message will preferably contain the certificate issued by MN 10, as well as a signature from the server 90 so that the server 90 can provide some authorization to the HA 40. When HA 40 receives this proxy BU message, HA 40 will verify the certificate and signature. If these are valid, HA 40 will create a BCE and will also note that this registration is a proxy registration being sent from server 90 of a particular address. The proxy BU message validity at HA 40 is performed by decrypting the certificate and preferably using the public key of server 90 found in the certificate to verify the signature which is attached by the server 90.
Once such verification has been done and it is successful, HA 40 will send the BA 205 to the server 90. The server 90 can possibly exchange a short-term key to establish BU and BA with HA 40 when it is in this proxying mode. After getting the positive acknowledgement from HA 40, the signaling proxy agent, which is server 90, will go into full proxy mode and send RR signaling to the CN 50. Server 90 will construct the home test Init (HoTI) message 207 and CoTI message 208 and will send to the CN. The HoTI message 207 will be constructed using the home address of MN 10 and will be encapsulated in a tunnel to HA 40. The CoTI message 208 will be constructed using the care-of address of MN 10 as the source address. It is essential that the HoA and CoA of MN 10 be given to the Server 90 so that it can construct these packets. These addresses will be given via the delegation message 202 to the server 90. Once the CN 50 receives these packets 207 and 208, it will generate the home key generation token (HoK) and send HoK via HoT and generate care-of key generation token (CoK) and CoK send it via CoT. These messages are shown as 209 and 211 in
From the above explanation, it can be seen that a trusted server for performing proxy signaling is preferably identified by using a trusted node such as MR 20 or by some other means. This proxy-signaling agent is chosen such that it can naturally generate CoTI messages using MN's CoA and overcoming ingress filtering. Moreover, it is preferably placed in a position such that it can directly intercept any CoT message sent by CN. The CoT message can be intercepted via the most optimized path. The advantage of such a server is that RR signaling can be done quickly because the server is in the fixed network infrastructure. Furthermore, the server need not change often although MN's nested NEMO is changing and that is advantageous. In this system, no new functionality is required on CN, which is advantageous as far as scalability is concerned. This new protocol needs to be understood by MN, MR, signaling proxy server and the HA of MN. The changes in MN and MR to support this are minimal. Only the signaling proxy server needs to have more changes to support this.
Another important feature of the present invention is that, there are no major security risks with this method. MN 10 trusts MR 20 since the MN 10 is inside the mobile network of MR 20 for long periods. MR 20 would preferably help in discovering a trusted signaling proxy for MN 10. Thus, signaling proxy is discovered by means of some hierarchical trust architecture. Another striking feature of this is that, only signaling rights are delegated. Data packets are still forwarded directly to MN. This reduces the burden on the signaling proxy server. In the scenario where the server becomes compromised and turn malicious, MN may not be receiving data packets. In such cases, MN can start sending the RR signaling packets itself. It can preferably inform MN-HA not to accept such proxy BU packets from the server.
Next, the delegation request and delegation request a reply message structure is explained.
The message 400 in
In another preferred embodiment a message structure of the delegation message originating from MN is given.
In yet another preferred embodiment of the present invention the message structure of the Proxy BU message sent from the signaling proxy server to the home agent of MN is described.
In another preferred embodiment of the present invention the signaling proxy server may preferably be the MR's home agent. The MR mentioned refers to the access router of MN. This is shown via a network or system diagram in
MR 20 will construct the delegation message and then tunnel it via its home agent, which is HA 41. MR 21 will further tunnel this message and the encapsulated message will travel via 704 and will reach HA 42. The HA 42 will decapsulate and send the message via 705 to HA 41. HA 41 will decapsulate the message and get the relevant certificate. After that, HA 41 will send proxy BU to HA 40 and will receive the respective BA from HA 40 and the path 706 in
In the case that MN delegates the signaling rights to home agent of MR 20, it is important to understand that MN must derive its care-of address from the prefix that is obtained from home network of MR 20 and this care-of address is what will be given to CN 50. This is essential for the invention described in
The main advantage of delegating the signaling rights to the home agent of MR is that since the MN is inside the vehicle for long periods the delegation request need not change and long-term proxy signaling mode can be established. If the MN's CoA is derived from the home network prefix of MR, then MR's HA can directly intercept all the RR packets and the proxy RR signaling can be done quickly. It will be explained in future embodiments, this is useful in many scenarios including the global HA-HA and NetLMM scenarios.
In yet another preferred embodiment of the main invention, there can be a scenario where the MN's signaling rights are delegated to its mobile router's home agent and the MN is deeply nested behind multiple MRs. The scenario is such that MN has simple MIPv6 implementation and the MRs have the standard NEMO Basic implementation. The signaling in this kind of scenario is shown in
In
In yet another preferred embodiment of the main invention, there can be a scenario where the MN is nested behind a MR and the MN's signaling rights are delegated to its mobile router's home agent. The home agents of the MN and MR may be of distributed type and may form one single global HA-HA overlay network. As discussed previously, such a global HA-HA network is useful for HA hand-off optimization and RO with IPv6 type of CN. In the future, such networks may gain popularity due to growing demand from the aviation industry and this embodiment shows that the delegation mechanism can work in such a scenario and it is also efficient. In this scenario, MN is considered to have simple MIPv6 implementation and the MR is considered to have the standard NEMO Basic implementation. Furthermore, it is assumed that MN uses the prefix assigned to MR from its home network to configure its CoA.
In
If MN 10 comes into the network attached to MR 20 and decides to delegate its signaling rights, it will perform the usual delegation request 812 and reply 813. Following that, it may construct the delegation message 814 and pass it on to MR 20 locally. MR 20 will send the delegation to its home agent. Proxy HA 802 will get the packet 815 and will act as the signaling proxy server. Since the home network of MN 10 is in the global HA-HA network, Proxy HA 802 may need to update (e.g. by sending proxy binding updates) all the MN's home agents including the proxy ones. The signaling proxy server 802 will first update primary HA 805 by using BU 816 and getting BA 817. Following that, proxy HA 802 will update the other two HAs in the network and these are shown as messages 818-821 in
Proxy HA 802 will construct the CoTI packet 824 using the CoA of MN 10 as the source address. To overcome ingress filtering, this has to be tunneled to a home agent in the overlay network that is close to CN 50. Proxy HA 802 has to do the same for the HoTI packet 822. These are shown as 822-825 in
In yet another preferred embodiment of the present invention there can be a scenario where the MN is nested inside a NEMO and the NEMO is roaming in a NetLMM domain and the home agent of the MR is the signaling proxy agent. The delegation mechanism can work in this scenario, as will be described in this embodiment.
MR 20 may enter the NetLMM domain and receives the router advertisement (RA) 900 from MAG 30. The prefix advertised in this RA message 900 will be the prefix used for NetLMM services and MR 20 will configure a care-of address from it. After that, the MAG 30 will register this CoA with LMA 35 and will inform the LMA 35 that this address can be reached via itself. Following that, MR 20 will want to send a BU to its HA which is HA 41. This BU packet will have a single level of tunnel from MAG 30 to LMA 35 as shown in
Now, MN 10 may receive a RA 906 from MR 20. The prefix advertised here might well be the prefix MR 20 obtained from its home network. MN 10 configures its CoA and does the usual delegation request signaling, shown as 907 and 908 in
Once HA 41 receives this delegation message 910, it will send the necessary proxy BU 911 to HA 40. Following that, HA 41 will perform the RR procedure with CN 50, as indicated by 912 in
In another preferred embodiment of the current invention, packet-processing mechanism at packet reception involved with the signaling proxy agent is described. It is important to understand, when MN's mobile access router delegates the signaling rights to its own HA, the HA only does the proxy RR signaling. This signaling proxy agent does not process data packets.
In the above description, the signaling proxy agent can be any node along the path from CN to MN. In particular, a person skilled in the art would appreciate that the signaling proxy agent can be the HA of the MR.
In yet another preferred embodiment of the present invention the packet processing mechanism at the home agent of MN is described. Here, MN refers to the node that has delegated its signaling rights to some server in the fixed infrastructure. The home agent of MN needs to have some small changes to support this delegated signaling mechanism. The steps involved in MN's HA are described in
In another preferred embodiment of the present invention, special signaling proxy servers exclusively for this proxy signaling purpose can preferably be deployed all over the infrastructure and can be discovered using care-of address of MN. A system or network diagram in
There are some scenarios where the MN 1207 would configure a care-of address from the mobile network prefix of MR 1208 which was obtained from the home network of MR 1208 and there are some other scenarios where MN 1207 would configure care-of address from a prefix given by AR 1209. There are some schemes that use the prefix obtained from the foreign domain and configures the care-of address and gives this address to the CN. Many NEMO RO schemes are doing this and hierarchical mobility management schemes are also doing this. As mentioned in a previous embodiment, there are some NEMO RO schemes that use the care-of address derived from MR's prefix given from its home network. An ideal proxy-signaling scheme should work for both prefix configuration methods so that solution is valid in any future system.
In this method, MN 1207 using its CoA can construct a suitable anycast address to trace the signaling proxy server. MN 1207 can find its own signaling proxy server or can ask MR 1208 to find one. If MN 1207 configures a care-of address from the prefix delegated by AR 1209, the signaling proxy server it finds will be the one in ISP 1204. The signaling message 1213 shows this server discovery. If the MN 1207 CoA is obtained from MR home network then the server discovered will be from ISP 1201 as shown in the figure. The signaling message 1212 will be used for this discovery.
When compared to the previous method, this has some advantages and some disadvantages. The advantage is that it can work in any scenario irrespective of which prefix the MN uses to configure its care-of address. Similar to the previous mechanism where MR's HA is the signaling proxy, this discovered signaling proxy server can also easily intercept CoT packets and also generate CoTI packets overcoming ingress filtering. This is possible because the signaling server is discovered using the MN's CoA and hence the server is in the path that can directly intercept the CoT packets and can generate CoTI packets using MN's CoA. The main issues with this mechanism are that it depends where this signaling server is placed. If it is not in the default path towards MN CoA prefix, then it needs to inject routes to intercept the CoT packets. Another problem is that such explicit signaling server needs to be deployed throughout which may be costly. Nevertheless, if such MN mobility patterns are common in the future (i.e. MN being embedded in a mobile network for long periods) then the deployment cost is more than covered by the signaling efficiency this scheme can bring.
In another preferred embodiment of the present invention the delegation discovery of the signaling proxy agent using the anycast method as well the proxy BU and proxy RR signaling is explained.
In yet another preferred embodiment of the present invention, discovering the suitable signaling proxy server using the anycast address method in a NEMO HMIPv6 scenario is described. In
In yet another preferred embodiment of the present invention, discovering the suitable signaling proxy server using the anycast address method in a NEMO NetLMM environment is described.
In another preferred embodiment of the present invention the anycast type of server discovery can take place in a NEMO RO scenario where the care-of address given to CN can preferably be the Top Level Mobile Router's (TLMR) CoA. This is illustrated in
Although the invention has been herein shown and described in what is conceived to be the most practical and preferred embodiment, it will be appreciated by those skilled in the art that various modifications may be made in details of design and parameters without departing from the scope and ambit of the invention.
Though it is assumed that there is a mobile network (or a hierarchical mobile network) consisting of a mobile router (and nodes therein) in the above embodiments, the present invention can be applied to Local Mobility Management environment.
For example, PMIP (Proxy Mobile IP), which is one of Local Mobility Management methods, provides mobility support for a mobile terminal by registering a moving mobile terminal at LMA (Local Mobility Anchor) by MAG (Mobile Access Gateway), and MR in this description can be adapted to be equivalent for MAG. In this case, it is considered that MR's HA may be equivalent for LMA. Furthermore, hierarchical mobile network may be equivalent for such a case that a network operator, providing a network which uses PMIP, uses multiple MAG-LMA tunnels constituted by PMIP due to roaming association.
In addition, local network domain architectures may be various due to roaming association among plural operators, etc. For example, it is considered that MAG is not only an access router for a mobile node, but also an edge router for a different access network (including roaming) and, after connecting to the different access network once, the mobile node connects via the different access network to MAG which is the edge router. It is also obvious that the operation of a signaling proxy server according to the present invention can be applied to the above case though there are differences in design matters such as various parameters, access procedures to MAG or communication procedures.
Each of the functional blocks and procedures used in the description of the embodiments of the present invention can be realized as LSI (Large Scale Integration), which is typically represented by an integrated circuit. These may be manufactured individually as one chip or may be manufactured as one chip including a part or all. Here, it is referred as LSI, while it may be called IC (Integrated Circuit), system LSI, super LSI or ultra LSI depending on the difference in the degree of integration.
The technique to produce the integrated circuit is not limited to the technique of LSI, and it may be realized as a special-purpose circuit or a general-purpose processor. After the manufacture of LSI, FPGA (Field Programmable Gate Array) or reconfigurable processor may be used, in which the connection and the setting of circuit cells inside LSI can be reconfigured.
Further, with the progress in the semiconductor technique or with the emergence of other technique derived from it, if a new technique of circuit integration to replace LSI may appear, the functional blocks may naturally be integrated by using such technique. For instance, the adaptation of biotechnology may be one of such possibilities.
The present invention has the advantage of reducing location update signaling for MN that is nested inside a NEMO network for long periods, and can be applied to the field of packet-switched communication.
Number | Date | Country | Kind |
---|---|---|---|
2007-044676 | Feb 2007 | JP | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP2008/000332 | 2/25/2008 | WO | 00 | 9/8/2009 |