Proxy-Based Hierarchical Distributed Mobility Management for Tactical Networks

被引:0
|
作者
Han, Myoung-hun [1 ,2 ]
Roh, Bong-Soo [1 ]
Kim, Kyungwoo [1 ]
Kwon, Dae-Hoon [1 ]
Ham, Jae-Hyun [1 ]
Yoon, KyungHyun [2 ]
Seo, Sanghyun [3 ]
机构
[1] Agcy Def Dev, Daejeon 34186, South Korea
[2] Chung Ang Univ, Dept Comp Sci & Engn, Seoul 06974, South Korea
[3] Chung Ang Univ, Coll Art Technol, Anseong 17546, South Korea
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 70卷 / 02期
关键词
Mobility management; tactical networks; PMIP; DMM; 5G;
D O I
10.32604/cmc.2022.020029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An important requirement in a military domain is a highly reliable mobility management method, especially when components of the networks are moving in tactical network environments. To increase reliability, the mobility management technology of the tactical network should be able to reflect the characteristics of the tactical network, such as a limited environment, failure, and hierarchical unit structure. In this paper, we propose a proxy-based hierarchical distributed mobility management scheme, which is highly focused on tactical networks. Considering the characteristics of tactical networks, the proposed scheme is composed of the following: 1) a proxy-based method, 2) a distributed mobility management method that synchronizes a mobility database between entities, and 3) a method of managing mobility by dividing the tactical network into upper and lower layers. Mathematical analysis and modeling and simulation results demonstrate that the method outperforms the existing state-of-the-art method in overcoming entity failure, handover cost, and delay in tactical environments.
引用
收藏
页码:2381 / 2399
页数:19
相关论文
共 50 条
  • [41] Research and Implementation of RDP Proxy Proxy-based Audit System
    Zhang, Xiao-Liang
    Wu, Xiao-Yu
    Zhang, Wu-Xia
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGY (CNCT 2016), 2016, 54 : 214 - 220
  • [42] A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks
    Wang, Fei
    Tang, Helen
    Yu, F. Richard
    Mason, Peter C.
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 1305 - +
  • [43] Proxy-based approaches for IDCT acceleration
    Pan, W
    Ortega, A
    Hajj-Ahmad, I
    Sannino, R
    VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2001, 2001, 4310 : 625 - 636
  • [44] Proxy-based Web Service Security
    Wu, Jian
    Huang, Zhimin
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1282 - 1288
  • [45] Clearmedia: A proxy-based architecture for streaming media services over wireless networks
    Balachandran, Krishna
    Calin, Doru
    Kim, Eunyoung
    Rege, Kiran M.
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 909 - 913
  • [46] Distributed Mobility Management in Vehicular Networks
    Carvalho, Jonathan
    Condeixa, Tiago
    Sargento, Susana
    2014 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2014,
  • [47] Distributed and adaptive location management scheme for hierarchical mobility management
    Hu, Xiao
    Song, Jun-De
    Song, Mei
    Zhou, Wei
    Journal of China Universities of Posts and Telecommunications, 2006, 13 (01): : 34 - 39
  • [48] Intentional Window Flow Control for Proxy-based TCP in Ad Hoe Networks
    Yamamoto, Yuta
    Yamamoto, Miki
    CQR: 2009 IEEE INTERNATIONAL WORKSHOP TECHNICAL COMMITTEE AND COMMUNICATIONS QUALITY AND RELIABILITY, 2009, : 35 - +
  • [50] Performance Evaluation of Flow Fairness in Proxy-based TCP for Ad Hoc Networks
    Matsumoto, Masato
    Yamamoto, Miki
    2011 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2011, : 780 - 785