P-SIGMA: security aware paging in end-to-end mobility management scheme
Mobile users need to maintain end-to-end connections when changing subnets. Handoff across networks often causes delay and loss of packets and make end users vulnerable to security threats that may lead to disruptions. In this paper, we design P-SIGMA , a delay and security-hardened, disruption-tole...
Gespeichert in:
Veröffentlicht in: | Wireless networks 2013-11, Vol.19 (8), p.2049-2065 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2065 |
---|---|
container_issue | 8 |
container_start_page | 2049 |
container_title | Wireless networks |
container_volume | 19 |
creator | Reaz, Abu Roy, Rajesh Atiquzzaman, Mohammed |
description | Mobile users need to maintain end-to-end connections when changing subnets. Handoff across networks often causes delay and loss of packets and make end users vulnerable to security threats that may lead to disruptions. In this paper, we design
P-SIGMA
, a delay and security-hardened, disruption-tolerant and signalling cost-effective end-to-end mobility management scheme by incorporating paging in
SIGMA
, an internet protocol diversity-based end-to-end transport layer mobility management scheme.
P-SIGMA
can detect and mitigate disruptions against two most common security threats: session hijacking and freeloading. We also propose a signalling cost analysis model for paging and a recovery-time model for attacks. To demonstrate performance improvement, we compare
P-SIGMA
with
SIGMA
and show the speed at which
P-SIGMA
can detect attacks (security breaches). We observe that
P-SIGMA
has lower signalling than
SIGMA
while maintaining all the benefits of a transport layer mobility management scheme.
P-SIGMA
can also detect paging related security threats with a small detection time without incurring any additional signalling. |
doi_str_mv | 10.1007/s11276-013-0550-8 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1671467659</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1671467659</sourcerecordid><originalsourceid>FETCH-LOGICAL-c331t-b4e336728ec305aa4ea93dfae4e2457af7f7cefe0a8e3f3070586788658169563</originalsourceid><addsrcrecordid>eNp1kE1LxDAQhoso-PkDvBVE8BKdJM1HvYnoKigK6jnMZqdrpU3XpIv4782yIiJ4moF53pfhKYpDDqccwJwlzoXRDLhkoBQwu1HscGUEs7zWm3kHIRiAtNvFbkpvAGBlXe8Uk0f2dDu5vzgvE_llbMfPEj8wUrnAeRvmZRtKCjM2DiyPsh-mbbdiegw4p57CWCb_mpf9YqvBLtHB99wrXq6vni9v2N3D5Pby4o55KfnIphVJqY2w5CUoxIqwlrMGqSJRKYONaYynhgAtyUaCAWW1sVYry3WttNwrTta9izi8LymNrm-Tp67DQMMyOa4Nr7TRqs7o0R_0bVjGkL9zGdFZiBU2U3xN-TikFKlxi9j2GD8dB7dS69ZqXVbrVmrdKnP83YzJY9dEDL5NP0FhrOS8NpkTay7lU5hT_PXBv-VfASKGTA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1466022828</pqid></control><display><type>article</type><title>P-SIGMA: security aware paging in end-to-end mobility management scheme</title><source>SpringerLink Journals</source><creator>Reaz, Abu ; Roy, Rajesh ; Atiquzzaman, Mohammed</creator><creatorcontrib>Reaz, Abu ; Roy, Rajesh ; Atiquzzaman, Mohammed</creatorcontrib><description>Mobile users need to maintain end-to-end connections when changing subnets. Handoff across networks often causes delay and loss of packets and make end users vulnerable to security threats that may lead to disruptions. In this paper, we design
P-SIGMA
, a delay and security-hardened, disruption-tolerant and signalling cost-effective end-to-end mobility management scheme by incorporating paging in
SIGMA
, an internet protocol diversity-based end-to-end transport layer mobility management scheme.
P-SIGMA
can detect and mitigate disruptions against two most common security threats: session hijacking and freeloading. We also propose a signalling cost analysis model for paging and a recovery-time model for attacks. To demonstrate performance improvement, we compare
P-SIGMA
with
SIGMA
and show the speed at which
P-SIGMA
can detect attacks (security breaches). We observe that
P-SIGMA
has lower signalling than
SIGMA
while maintaining all the benefits of a transport layer mobility management scheme.
P-SIGMA
can also detect paging related security threats with a small detection time without incurring any additional signalling.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-013-0550-8</identifier><language>eng</language><publisher>Boston: Springer US</publisher><subject>Alliances ; Applied sciences ; Bandwidths ; Cellular telephones ; Communications Engineering ; Computer Communication Networks ; Computer science ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Cryptography ; Delay ; Disruption ; Electrical Engineering ; Engineering ; Equipments and installations ; Exact sciences and technology ; Information, signal and communications theory ; Infrastructure ; Internet Protocol ; IP (Internet Protocol) ; IT in Business ; Management ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Mobile radiocommunication systems ; Networks ; Paging ; Radiocommunications ; Security ; Signal and communications theory ; Signalling ; Software ; Telecommunications ; Telecommunications and information theory ; Transport ; Wireless networks</subject><ispartof>Wireless networks, 2013-11, Vol.19 (8), p.2049-2065</ispartof><rights>Springer Science+Business Media New York 2013</rights><rights>2015 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c331t-b4e336728ec305aa4ea93dfae4e2457af7f7cefe0a8e3f3070586788658169563</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11276-013-0550-8$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11276-013-0550-8$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,777,781,27905,27906,41469,42538,51300</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27831197$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Reaz, Abu</creatorcontrib><creatorcontrib>Roy, Rajesh</creatorcontrib><creatorcontrib>Atiquzzaman, Mohammed</creatorcontrib><title>P-SIGMA: security aware paging in end-to-end mobility management scheme</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>Mobile users need to maintain end-to-end connections when changing subnets. Handoff across networks often causes delay and loss of packets and make end users vulnerable to security threats that may lead to disruptions. In this paper, we design
P-SIGMA
, a delay and security-hardened, disruption-tolerant and signalling cost-effective end-to-end mobility management scheme by incorporating paging in
SIGMA
, an internet protocol diversity-based end-to-end transport layer mobility management scheme.
P-SIGMA
can detect and mitigate disruptions against two most common security threats: session hijacking and freeloading. We also propose a signalling cost analysis model for paging and a recovery-time model for attacks. To demonstrate performance improvement, we compare
P-SIGMA
with
SIGMA
and show the speed at which
P-SIGMA
can detect attacks (security breaches). We observe that
P-SIGMA
has lower signalling than
SIGMA
while maintaining all the benefits of a transport layer mobility management scheme.
P-SIGMA
can also detect paging related security threats with a small detection time without incurring any additional signalling.</description><subject>Alliances</subject><subject>Applied sciences</subject><subject>Bandwidths</subject><subject>Cellular telephones</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer science</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Cryptography</subject><subject>Delay</subject><subject>Disruption</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Equipments and installations</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Infrastructure</subject><subject>Internet Protocol</subject><subject>IP (Internet Protocol)</subject><subject>IT in Business</subject><subject>Management</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Mobile radiocommunication systems</subject><subject>Networks</subject><subject>Paging</subject><subject>Radiocommunications</subject><subject>Security</subject><subject>Signal and communications theory</subject><subject>Signalling</subject><subject>Software</subject><subject>Telecommunications</subject><subject>Telecommunications and information theory</subject><subject>Transport</subject><subject>Wireless networks</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kE1LxDAQhoso-PkDvBVE8BKdJM1HvYnoKigK6jnMZqdrpU3XpIv4782yIiJ4moF53pfhKYpDDqccwJwlzoXRDLhkoBQwu1HscGUEs7zWm3kHIRiAtNvFbkpvAGBlXe8Uk0f2dDu5vzgvE_llbMfPEj8wUrnAeRvmZRtKCjM2DiyPsh-mbbdiegw4p57CWCb_mpf9YqvBLtHB99wrXq6vni9v2N3D5Pby4o55KfnIphVJqY2w5CUoxIqwlrMGqSJRKYONaYynhgAtyUaCAWW1sVYry3WttNwrTta9izi8LymNrm-Tp67DQMMyOa4Nr7TRqs7o0R_0bVjGkL9zGdFZiBU2U3xN-TikFKlxi9j2GD8dB7dS69ZqXVbrVmrdKnP83YzJY9dEDL5NP0FhrOS8NpkTay7lU5hT_PXBv-VfASKGTA</recordid><startdate>20131101</startdate><enddate>20131101</enddate><creator>Reaz, Abu</creator><creator>Roy, Rajesh</creator><creator>Atiquzzaman, Mohammed</creator><general>Springer US</general><general>Springer</general><general>Springer Nature B.V</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20131101</creationdate><title>P-SIGMA: security aware paging in end-to-end mobility management scheme</title><author>Reaz, Abu ; Roy, Rajesh ; Atiquzzaman, Mohammed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c331t-b4e336728ec305aa4ea93dfae4e2457af7f7cefe0a8e3f3070586788658169563</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Alliances</topic><topic>Applied sciences</topic><topic>Bandwidths</topic><topic>Cellular telephones</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer science</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Cryptography</topic><topic>Delay</topic><topic>Disruption</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Equipments and installations</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Infrastructure</topic><topic>Internet Protocol</topic><topic>IP (Internet Protocol)</topic><topic>IT in Business</topic><topic>Management</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Mobile radiocommunication systems</topic><topic>Networks</topic><topic>Paging</topic><topic>Radiocommunications</topic><topic>Security</topic><topic>Signal and communications theory</topic><topic>Signalling</topic><topic>Software</topic><topic>Telecommunications</topic><topic>Telecommunications and information theory</topic><topic>Transport</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Reaz, Abu</creatorcontrib><creatorcontrib>Roy, Rajesh</creatorcontrib><creatorcontrib>Atiquzzaman, Mohammed</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Reaz, Abu</au><au>Roy, Rajesh</au><au>Atiquzzaman, Mohammed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>P-SIGMA: security aware paging in end-to-end mobility management scheme</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2013-11-01</date><risdate>2013</risdate><volume>19</volume><issue>8</issue><spage>2049</spage><epage>2065</epage><pages>2049-2065</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>Mobile users need to maintain end-to-end connections when changing subnets. Handoff across networks often causes delay and loss of packets and make end users vulnerable to security threats that may lead to disruptions. In this paper, we design
P-SIGMA
, a delay and security-hardened, disruption-tolerant and signalling cost-effective end-to-end mobility management scheme by incorporating paging in
SIGMA
, an internet protocol diversity-based end-to-end transport layer mobility management scheme.
P-SIGMA
can detect and mitigate disruptions against two most common security threats: session hijacking and freeloading. We also propose a signalling cost analysis model for paging and a recovery-time model for attacks. To demonstrate performance improvement, we compare
P-SIGMA
with
SIGMA
and show the speed at which
P-SIGMA
can detect attacks (security breaches). We observe that
P-SIGMA
has lower signalling than
SIGMA
while maintaining all the benefits of a transport layer mobility management scheme.
P-SIGMA
can also detect paging related security threats with a small detection time without incurring any additional signalling.</abstract><cop>Boston</cop><pub>Springer US</pub><doi>10.1007/s11276-013-0550-8</doi><tpages>17</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1022-0038 |
ispartof | Wireless networks, 2013-11, Vol.19 (8), p.2049-2065 |
issn | 1022-0038 1572-8196 |
language | eng |
recordid | cdi_proquest_miscellaneous_1671467659 |
source | SpringerLink Journals |
subjects | Alliances Applied sciences Bandwidths Cellular telephones Communications Engineering Computer Communication Networks Computer science Computer science control theory systems Computer systems and distributed systems. User interface Cryptography Delay Disruption Electrical Engineering Engineering Equipments and installations Exact sciences and technology Information, signal and communications theory Infrastructure Internet Protocol IP (Internet Protocol) IT in Business Management Memory and file management (including protection and security) Memory organisation. Data processing Mobile radiocommunication systems Networks Paging Radiocommunications Security Signal and communications theory Signalling Software Telecommunications Telecommunications and information theory Transport Wireless networks |
title | P-SIGMA: security aware paging in end-to-end mobility management scheme |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T04%3A01%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=P-SIGMA:%20security%20aware%20paging%20in%20end-to-end%20mobility%20management%20scheme&rft.jtitle=Wireless%20networks&rft.au=Reaz,%20Abu&rft.date=2013-11-01&rft.volume=19&rft.issue=8&rft.spage=2049&rft.epage=2065&rft.pages=2049-2065&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-013-0550-8&rft_dat=%3Cproquest_cross%3E1671467659%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1466022828&rft_id=info:pmid/&rfr_iscdi=true |