Access the full text.
Sign up today, get DeepDyve free for 14 days.
Kuok-Shoong Wong, W. Woon (2007)
Simultaneous Mobility: A New Analytical Approach2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring
A. Dhraief, Amine Ghorbali, Tarak Bouali, A. Belghith, K. Drira (2012)
HBMON: A HIP based M2M overlay network2012 Third International Conference on The Network of the Future (NOF)
R. Lu, Xu Li, Xiaohui Liang, Xuemin Shen, Xiaodong Lin (2011)
GRS: The green, reliability, and security of emerging machine to machine communicationsIEEE Communications Magazine, 49
M. Uusitalo (2006)
Global Vision for the Future Wireless World from the WWRFIEEE Vehicular Technology Magazine, 1
Yan Zhang, Rong Yu, Shengli Xie, Wenqing Yao, Yang Xiao, M. Guizani (2011)
Home M2M networks: Architectures, standards, and QoS improvementIEEE Communications Magazine, 49
P. Nikander, T. Henderson, Christian Vogt, J. Arkko (2008)
End-Host Mobility and Multihoming with the Host Identity ProtocolRFC, 5206
A. Dhraief, A. Belghith, K. Drira, Tarek Bouali, Mohamed Ghorbali (2013)
Autonomic Management of the HIP-based M2M Overlay Network
T. Henderson, J. Ahrenholz, J. Kim (2003)
Experience with the host identity protocol for secure host mobility and multihoming2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003., 3
Z. Fadlullah, M. Fouda, N. Kato, A. Takeuchi, Noboru Iwasaki, Y. Nozaki (2011)
Toward intelligent machine-to-machine communications in smart gridIEEE Communications Magazine, 49
(2013)
Mobility Management in the HIP-based M2M Overlay Network
L. Bokor, S. Nováczki, L. Zeke, G. Jeney (2009)
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
A. Reaz, P. Chowdhury, Mohammed Atiquzzaman, W. Ivancic (2006)
Signalling cost analysis of SINEMO: seamless end-to-end network mobility
A. Dhraief, N. Montavont (2009)
Rehoming Decision Algorithm: Design and Empirical Evaluation2009 International Conference on Computational Science and Engineering, 2
C. Bettstetter, H. Hartenstein, X. Costa (2004)
Stochastic Properties of the Random Waypoint Mobility ModelWireless Networks, 10
Geng Wu, S. Talwar, Kerstin Johnsson, N. Himayat, Nageen Johnson (2011)
M2M: From mobile to embedded internetIEEE Communications Magazine, 49
The host identity protocol-based (HIP) machine-to-machine (M2M) overlay network is a virtual, self-organised and secure M2M network build on the top of the internet. M2M devices forming this overlay network may change their point of attachment to the overlay while having running sessions. HIP provides a native mobility support to these M2M devices. However, this support is not adapted for the M2M context. We propose in this paper a regular and lightweight mobility strategies to efficiently handle M2M devices mobility within this overlay. We first analytically assess the signalling cost of the regular and lightweight mobility strategies. Then, we evaluate the application recovery time of an M2M device experiencing a mobility episode through simulation. Both signalling cost analysis and simulation results show that our lightweight mobility strategy significantly out-performs regular HIP. Keywords: host identity protocol; HIP; machine-to-machine; M2M; mobility support; signalling cost; application recovery time; OMNeT++; overlay networks. Reference to this paper should be made as follows: Dhraief, A., Belghith, A. and Drira, K. (2016) `Regular and lightweight mobility management in the HIP-based M2M overlay network', Int. J. Autonomous and Adaptive Communications Systems, Vol. 9, Nos. 3/4, pp.331352. Biographical notes: Amine Dhraief received his PhD in Computer Science
International Journal of Autonomous and Adaptive Communications Systems – Inderscience Publishers
Published: Jan 1, 2016
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.