An accurate and extensible mobile IPv6 (xMIPV6) simulation model for OMNeT++
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Host Identity Protocol (HIP): Towards the Secure Mobile Internet
Host Identity Protocol (HIP): Towards the Secure Mobile Internet
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Network mobility support in PMIPv6 network
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Modeling and Tools for Network Simulation
Modeling and Tools for Network Simulation
Performance analysis of HIP diet exchange for WSN security establishment
Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
IEEE Communications Surveys & Tutorials
Experimental analysis of the femtocell location verification techniques
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Hi-index | 0.00 |
Femtocells are commissioned in wide range of commercial systems, such as CDMA, GSM, LTE, Wi-Fi, and WiMAX, and offer economically viable solutions to improve network scalability and indoor coverage. The ability to offer multitude of context-aware and value added services, and per-user customization have caught world-wide research interest on femtocells. In this article, we have investigated the feasibility to use femtocells as short-range mobile base stations, and discussed the demanding architectural requirements and challenges. The protocol stack on legacy femtocells must be modified to realize mobility. Mobility introduces new challenges in security and user privacy. Firstly, we analyze several candidate mobility protocols that are deployable on Mobile Femtocells (MFs). Among them, Host Identity Protocol (HIP) was chosen due to enhanced support in flexible mobility, security and end-user privacy. Secondly, we propose the indispensable modifications that enable device mobility, and the suitable transport architecture options based on direct IP links and relay chains. Finally, with the simulation results, the proposal is verified, and the architectural options are evaluated. That, in turn, proves the proposed mobility protocol has low latency in location locking with respect to another competing protocol and low resource utilization as it is depicted from mean round trip time.