P-SIGMA: security aware paging in end-to-end mobility management scheme

Mobile users need to maintain end-to-end connections when changing subnets. Handoff across networks often causes delay and loss of packets and make end users vulnerable to security threats that may lead to disruptions. In this paper, we design P-SIGMA , a delay and security-hardened, disruption-tole...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless networks 2013-11, Vol.19 (8), p.2049-2065
Hauptverfasser: Reaz, Abu, Roy, Rajesh, Atiquzzaman, Mohammed
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2065
container_issue 8
container_start_page 2049
container_title Wireless networks
container_volume 19
creator Reaz, Abu
Roy, Rajesh
Atiquzzaman, Mohammed
description Mobile users need to maintain end-to-end connections when changing subnets. Handoff across networks often causes delay and loss of packets and make end users vulnerable to security threats that may lead to disruptions. In this paper, we design P-SIGMA , a delay and security-hardened, disruption-tolerant and signalling cost-effective end-to-end mobility management scheme by incorporating paging in SIGMA , an internet protocol diversity-based end-to-end transport layer mobility management scheme. P-SIGMA can detect and mitigate disruptions against two most common security threats: session hijacking and freeloading. We also propose a signalling cost analysis model for paging and a recovery-time model for attacks. To demonstrate performance improvement, we compare P-SIGMA with SIGMA and show the speed at which P-SIGMA can detect attacks (security breaches). We observe that P-SIGMA has lower signalling than SIGMA while maintaining all the benefits of a transport layer mobility management scheme. P-SIGMA can also detect paging related security threats with a small detection time without incurring any additional signalling.
doi_str_mv 10.1007/s11276-013-0550-8
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1671467659</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1671467659</sourcerecordid><originalsourceid>FETCH-LOGICAL-c331t-b4e336728ec305aa4ea93dfae4e2457af7f7cefe0a8e3f3070586788658169563</originalsourceid><addsrcrecordid>eNp1kE1LxDAQhoso-PkDvBVE8BKdJM1HvYnoKigK6jnMZqdrpU3XpIv4782yIiJ4moF53pfhKYpDDqccwJwlzoXRDLhkoBQwu1HscGUEs7zWm3kHIRiAtNvFbkpvAGBlXe8Uk0f2dDu5vzgvE_llbMfPEj8wUrnAeRvmZRtKCjM2DiyPsh-mbbdiegw4p57CWCb_mpf9YqvBLtHB99wrXq6vni9v2N3D5Pby4o55KfnIphVJqY2w5CUoxIqwlrMGqSJRKYONaYynhgAtyUaCAWW1sVYry3WttNwrTta9izi8LymNrm-Tp67DQMMyOa4Nr7TRqs7o0R_0bVjGkL9zGdFZiBU2U3xN-TikFKlxi9j2GD8dB7dS69ZqXVbrVmrdKnP83YzJY9dEDL5NP0FhrOS8NpkTay7lU5hT_PXBv-VfASKGTA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1466022828</pqid></control><display><type>article</type><title>P-SIGMA: security aware paging in end-to-end mobility management scheme</title><source>SpringerLink Journals</source><creator>Reaz, Abu ; Roy, Rajesh ; Atiquzzaman, Mohammed</creator><creatorcontrib>Reaz, Abu ; Roy, Rajesh ; Atiquzzaman, Mohammed</creatorcontrib><description>Mobile users need to maintain end-to-end connections when changing subnets. Handoff across networks often causes delay and loss of packets and make end users vulnerable to security threats that may lead to disruptions. In this paper, we design P-SIGMA , a delay and security-hardened, disruption-tolerant and signalling cost-effective end-to-end mobility management scheme by incorporating paging in SIGMA , an internet protocol diversity-based end-to-end transport layer mobility management scheme. P-SIGMA can detect and mitigate disruptions against two most common security threats: session hijacking and freeloading. We also propose a signalling cost analysis model for paging and a recovery-time model for attacks. To demonstrate performance improvement, we compare P-SIGMA with SIGMA and show the speed at which P-SIGMA can detect attacks (security breaches). We observe that P-SIGMA has lower signalling than SIGMA while maintaining all the benefits of a transport layer mobility management scheme. P-SIGMA can also detect paging related security threats with a small detection time without incurring any additional signalling.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-013-0550-8</identifier><language>eng</language><publisher>Boston: Springer US</publisher><subject>Alliances ; Applied sciences ; Bandwidths ; Cellular telephones ; Communications Engineering ; Computer Communication Networks ; Computer science ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Cryptography ; Delay ; Disruption ; Electrical Engineering ; Engineering ; Equipments and installations ; Exact sciences and technology ; Information, signal and communications theory ; Infrastructure ; Internet Protocol ; IP (Internet Protocol) ; IT in Business ; Management ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Mobile radiocommunication systems ; Networks ; Paging ; Radiocommunications ; Security ; Signal and communications theory ; Signalling ; Software ; Telecommunications ; Telecommunications and information theory ; Transport ; Wireless networks</subject><ispartof>Wireless networks, 2013-11, Vol.19 (8), p.2049-2065</ispartof><rights>Springer Science+Business Media New York 2013</rights><rights>2015 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c331t-b4e336728ec305aa4ea93dfae4e2457af7f7cefe0a8e3f3070586788658169563</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11276-013-0550-8$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11276-013-0550-8$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,777,781,27905,27906,41469,42538,51300</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=27831197$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Reaz, Abu</creatorcontrib><creatorcontrib>Roy, Rajesh</creatorcontrib><creatorcontrib>Atiquzzaman, Mohammed</creatorcontrib><title>P-SIGMA: security aware paging in end-to-end mobility management scheme</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>Mobile users need to maintain end-to-end connections when changing subnets. Handoff across networks often causes delay and loss of packets and make end users vulnerable to security threats that may lead to disruptions. In this paper, we design P-SIGMA , a delay and security-hardened, disruption-tolerant and signalling cost-effective end-to-end mobility management scheme by incorporating paging in SIGMA , an internet protocol diversity-based end-to-end transport layer mobility management scheme. P-SIGMA can detect and mitigate disruptions against two most common security threats: session hijacking and freeloading. We also propose a signalling cost analysis model for paging and a recovery-time model for attacks. To demonstrate performance improvement, we compare P-SIGMA with SIGMA and show the speed at which P-SIGMA can detect attacks (security breaches). We observe that P-SIGMA has lower signalling than SIGMA while maintaining all the benefits of a transport layer mobility management scheme. P-SIGMA can also detect paging related security threats with a small detection time without incurring any additional signalling.</description><subject>Alliances</subject><subject>Applied sciences</subject><subject>Bandwidths</subject><subject>Cellular telephones</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer science</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Cryptography</subject><subject>Delay</subject><subject>Disruption</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Equipments and installations</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Infrastructure</subject><subject>Internet Protocol</subject><subject>IP (Internet Protocol)</subject><subject>IT in Business</subject><subject>Management</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Mobile radiocommunication systems</subject><subject>Networks</subject><subject>Paging</subject><subject>Radiocommunications</subject><subject>Security</subject><subject>Signal and communications theory</subject><subject>Signalling</subject><subject>Software</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Transport</subject><subject>Wireless networks</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kE1LxDAQhoso-PkDvBVE8BKdJM1HvYnoKigK6jnMZqdrpU3XpIv4782yIiJ4moF53pfhKYpDDqccwJwlzoXRDLhkoBQwu1HscGUEs7zWm3kHIRiAtNvFbkpvAGBlXe8Uk0f2dDu5vzgvE_llbMfPEj8wUrnAeRvmZRtKCjM2DiyPsh-mbbdiegw4p57CWCb_mpf9YqvBLtHB99wrXq6vni9v2N3D5Pby4o55KfnIphVJqY2w5CUoxIqwlrMGqSJRKYONaYynhgAtyUaCAWW1sVYry3WttNwrTta9izi8LymNrm-Tp67DQMMyOa4Nr7TRqs7o0R_0bVjGkL9zGdFZiBU2U3xN-TikFKlxi9j2GD8dB7dS69ZqXVbrVmrdKnP83YzJY9dEDL5NP0FhrOS8NpkTay7lU5hT_PXBv-VfASKGTA</recordid><startdate>20131101</startdate><enddate>20131101</enddate><creator>Reaz, Abu</creator><creator>Roy, Rajesh</creator><creator>Atiquzzaman, Mohammed</creator><general>Springer US</general><general>Springer</general><general>Springer Nature B.V</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20131101</creationdate><title>P-SIGMA: security aware paging in end-to-end mobility management scheme</title><author>Reaz, Abu ; Roy, Rajesh ; Atiquzzaman, Mohammed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c331t-b4e336728ec305aa4ea93dfae4e2457af7f7cefe0a8e3f3070586788658169563</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Alliances</topic><topic>Applied sciences</topic><topic>Bandwidths</topic><topic>Cellular telephones</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer science</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Cryptography</topic><topic>Delay</topic><topic>Disruption</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Equipments and installations</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Infrastructure</topic><topic>Internet Protocol</topic><topic>IP (Internet Protocol)</topic><topic>IT in Business</topic><topic>Management</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Mobile radiocommunication systems</topic><topic>Networks</topic><topic>Paging</topic><topic>Radiocommunications</topic><topic>Security</topic><topic>Signal and communications theory</topic><topic>Signalling</topic><topic>Software</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Transport</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Reaz, Abu</creatorcontrib><creatorcontrib>Roy, Rajesh</creatorcontrib><creatorcontrib>Atiquzzaman, Mohammed</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Reaz, Abu</au><au>Roy, Rajesh</au><au>Atiquzzaman, Mohammed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>P-SIGMA: security aware paging in end-to-end mobility management scheme</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2013-11-01</date><risdate>2013</risdate><volume>19</volume><issue>8</issue><spage>2049</spage><epage>2065</epage><pages>2049-2065</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>Mobile users need to maintain end-to-end connections when changing subnets. Handoff across networks often causes delay and loss of packets and make end users vulnerable to security threats that may lead to disruptions. In this paper, we design P-SIGMA , a delay and security-hardened, disruption-tolerant and signalling cost-effective end-to-end mobility management scheme by incorporating paging in SIGMA , an internet protocol diversity-based end-to-end transport layer mobility management scheme. P-SIGMA can detect and mitigate disruptions against two most common security threats: session hijacking and freeloading. We also propose a signalling cost analysis model for paging and a recovery-time model for attacks. To demonstrate performance improvement, we compare P-SIGMA with SIGMA and show the speed at which P-SIGMA can detect attacks (security breaches). We observe that P-SIGMA has lower signalling than SIGMA while maintaining all the benefits of a transport layer mobility management scheme. P-SIGMA can also detect paging related security threats with a small detection time without incurring any additional signalling.</abstract><cop>Boston</cop><pub>Springer US</pub><doi>10.1007/s11276-013-0550-8</doi><tpages>17</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1022-0038
ispartof Wireless networks, 2013-11, Vol.19 (8), p.2049-2065
issn 1022-0038
1572-8196
language eng
recordid cdi_proquest_miscellaneous_1671467659
source SpringerLink Journals
subjects Alliances
Applied sciences
Bandwidths
Cellular telephones
Communications Engineering
Computer Communication Networks
Computer science
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Cryptography
Delay
Disruption
Electrical Engineering
Engineering
Equipments and installations
Exact sciences and technology
Information, signal and communications theory
Infrastructure
Internet Protocol
IP (Internet Protocol)
IT in Business
Management
Memory and file management (including protection and security)
Memory organisation. Data processing
Mobile radiocommunication systems
Networks
Paging
Radiocommunications
Security
Signal and communications theory
Signalling
Software
Telecommunications
Telecommunications and information theory
Transport
Wireless networks
title P-SIGMA: security aware paging in end-to-end mobility management scheme
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T04%3A01%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=P-SIGMA:%20security%20aware%20paging%20in%20end-to-end%20mobility%20management%20scheme&rft.jtitle=Wireless%20networks&rft.au=Reaz,%20Abu&rft.date=2013-11-01&rft.volume=19&rft.issue=8&rft.spage=2049&rft.epage=2065&rft.pages=2049-2065&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-013-0550-8&rft_dat=%3Cproquest_cross%3E1671467659%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1466022828&rft_id=info:pmid/&rfr_iscdi=true