Role of Diameter Based Protocol in enhancing of new ... - ScienceDirect

9 downloads 0 Views 158KB Size Report
Tech 1st sem in Embedded system Design,School of Engineering & technology,Jain University,Bangalore-562112,India. eB.Tech 3rd sem in ECE,School of ...
Available online at www.sciencedirect.com

ScienceDirect Procedia Computer Science 78 (2016) 415 – 422

,QWHUQDWLRQDO&RQIHUHQFHRQ,QIRUPDWLRQ6HFXULW\ 3ULYDF\ ,&,63 'HFHPEHU 1DJSXU,1',$

5ROHRI'LDPHWHU%DVHG3URWRFROLQHQKDQFLQJRIQHZDQG 8SFRPLQJ7HFKQRORJLHV 9LQD\.XPDU6%D3UDVDQQD.XPDU&E%LPOHQGX6KDKLF'LY\D-KDG0RQLFD%9H6XUHVK .XPDU&3I a,f

Assistant Professor,Department ECE, School of Engineering & Technology, ,Jain University,Bangalore-562112,India. b Associate Professor,Department ECE,Sahyadri College of Engineering & Management,Mangalore-575007,India. c,d M.Tech 1st sem in Embedded system Design,School of Engineering & technology,Jain University,Bangalore-562112,India. e B.Tech 3rd sem in ECE,School of Engineering & technology,Jain University,Bangalore-562112,India.

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‹7KH$XWKRUV3XEOLVKHGE\(OVHYLHU%9 © 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license 3HHUUHYLHZXQGHUUHVSRQVLELOLW\RIRUJDQL]LQJFRPPLWWHHRIWKH,QWHUQDWLRQDO&RQIHUHQFHRQ,QIRUPDWLRQ6HFXULW\DQG3ULYDF\ (http://creativecommons.org/licenses/by-nc-nd/4.0/). ,&,63  Peer-review under responsibility of organizing committee of the ICISP2015 Keywords:',$0(7(55$',86$$$'6&$'6/+'6/1$6***/7(:L0$;:L)L/L)L::::

,QWURGXFWLRQ 'LDPHWHU3URWRFROLVDQH[WHQGHGYHUVLRQRIWKH5$',86SURWRFROIRU$XWKHQWLFDWLRQ$XWKRUL]DWLRQDQG 

&RUUHVSRQGLQJDXWKRU7HOID[ (PDLODGGUHVVYLQD\VERPP#JPDLOFRP

1877-0509 © 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer-review under responsibility of organizing committee of the ICISP2015 doi:10.1016/j.procs.2016.02.083

416

Vinay Kumar S.B. et al. / Procedia Computer Science 78 (2016) 415 – 422

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

   )LJ$$$$UFKLWHFWXUH

,QWKHSUHYLRXVGD\VVXEVFULEHUVXWLOL]HWKHLQWHUQHWDFFHVVE\ORJLQLQWRWKHLU8VHU,'DQGSDVVZRUGDIWHUGLDOLQJ WKRXJK02'(0LQRUGHUWRFRQQHFWWKHLU,QWHUQHW6HUYLFHSURYLGHUV ,63V ZKLFKWKHQDXWKHQWLFDWHGWKHVXEVFULEHU JUDQWLQJ,QWHUQHWDFFHVV$OVRLIVXEVFULEHUVRQO\KDYHRQHSKRQHOLQHWKHQWKH\ZRQ¶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¶VGHSRVLWRU\EDVLFEXWFRKHUHQWPHFKDQLVPFDOOHG5DGLXVSURWRFROZDV DFFRPSOLVKHG WR SURYLGH VXFK $$$ FDSDELOLW\ VHUYLFHV DQG IHDWXUHV ,Q RUGHU WR DGYDQFHDQG DGG XS UHFHQW VSHFLDOL]DWLRQWR5$',86SURWRFROWKHUHZHUHVHYHUDOVXEVLGLDU\SURWRFROVDFFRPSOLVKHG2QHRIDJUHDWHUVWDQGDUG DQG IOH[LEOH SURWRFRO ZDV HYROYHGNQRZQ DV'LDPHWHU EDVHG SURWRFRO 7KLV SURWRFRO LPSOLFDWHV VWDQGDUG'LVWULEXWHG 1HWZRUN IUDPHZRUN IRU XOWLPDWH $$$ IXQFWLRQ ,QWHUQHW XQOLPLWHG GHPDQGDQG DSSDUHQW RI UHFHQW DQG XSFRPLQJ WHFKQRORJLHVLQZLUHOLQHWHFKQRORJLHVHJ$'6/(WKHUQHWEDVHGHWFDQGZLUHOHVVWHFKQRORJLHVHJ0RELOHEDVHG

Vinay Kumar S.B. et al. / Procedia Computer Science 78 (2016) 415 – 422

417

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uthentication capabilities $V H[SODLQHG LQ 5)&  DXWKHQWLFDWLRQ FDSDELOLWLHV IRU ERWK 5$',86 DQG 'LDPHWHU EDVHG SURWRFRO UHTXLUH 1$,V 1HWZRUN $FFHVV ,GHQWLILHU  ($3 ([WHQVLEOH $XWKHQWLFDWLRQ 3URWRFRO  &+$3 &KDOOHQJH +DQGVKDNH $XWKHQWLFDWLRQ 3URWRFRO  DQG 3$3 3DVVZRUG $XWKHQWLFDWLRQ 3URWRFRO  %XW IRU 5DGLXV SURWRFRO &+$3 DXWKHQWLFDWLRQLVGLUHFWHGWRGLFWLRQDU\DWWDFNVDQGWKXVRQO\SURWHFWVFOHDUWH[WSDVVZRUGV 3$3 RQDQQRGHWRQRGH EDVLV 7KH ($3 DXWKHQWLFDWLRQ LV DEOH WR H[SODLQ RQO\ LQ FDVH RI 5)&  ³5$',86 ([WHQVLRQV´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uthorization capabilities $UHDVFRQFHUQLQJWRDXWKRUL]DWLRQUHVWULFWLRQVDFFHVVUXOHVDQGILOWHUVHJDELOLWLHVWRGHQ\DFFHVVWRSUR[\EURNHUV DUHGLUHFWHGE\ERWK5DGLXVDQG'LDPHWHUEDVHGSURWRFROVDUHZHOOH[SODLQHGLQ5)&'LDPHWHUEDVHGSURWRFRO GLUHFWV HIILFLHQW UHDXWKRUL]DWLRQ RQ GHPDQG WKDQ 5$',86 3URWRFROV ,Q FDVH RI 5DGLXV 3URWRFRO LW QHYHU DFNQRZOHGJH FOLHQW EDVHG 1$6HV WR GLVFRQWLQXH D VHVVLRQ RI D SDUWLFXODU VXEVFULEHUV WKDW DFNQRZOHGJLQJ $$$ EDVHGFHQWUDOVHUYHUFDQJHQHUDWHDQGPDLQWDLQSRZHUIXODXWKRUL]DWLRQSROLF\VHWXS  2.3 Accounting capabilities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ailover Mechanism )DLORYHUPHFKDQLVPIRU5$',86LVQRWZHOOGHILQHGVRIDLORYHUPHFKDQLVPGLIIHUVIURPRQHLPSOHPHQWDWLRQWR WKH RWKHU ,Q RUGHU WR DYDLO ZHOO LPSOHPHQWHG IDLORYHU PHFKDQLVP 'LDPHWHU EDVHG SURWRFRO DFNQRZOHGJHV DSSOLFDWLRQOD\HUIRULPSOHPHQWDWLRQRIZHOOGHILQHGDQGEULQJRXWWRJHWKHUDOOVWDWHPDFKLQHDOJRULWKPVLQIDLORYHU PHFKDQLVPVIRUUHFHQWDQGXSFRPLQJWHFKQRORJLHV  2.3.2 Transport-based Security

418

Vinay Kumar S.B. et al. / Procedia Computer Science 78 (2016) 415 – 422

5$',86 VXSSRUWV 8'3 ZKLFK LV VWDWHOHVV SURWRFRO DQG OLJKW ZHLJKW SURWRFRO 7KLV LV XQDEOH WR LPSOHPHQW UHWUDQVPLVVLRQVWUDWHJ\7KLVLVDFRQVLGHUDEOHFKDOOHQJHLQDFFRXQWLQJZKHUHORVVRIGDWDSDFNHWPLJKWLQVWDQWO\WXUQ LQWR UHYHQXH ORVV 6R IRU EHWWHU VXSSRUW RI WUDQVSRUWEDVHG VHFXULW\ 'LDPHWHU HQKDQFHV UHOLDEOH WUDQVSRUW VWUDWHJ\ VXFKDV7&36&73HWFLQWKHQHZDQGXSFRPLQJ7HFKQRORJLHV  2.3.3 Agent Support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imited Attribute data Size $ 5$',86 EDVHG DWWULEXWH GDWD VL]H LV IRUZDUGHG LQ WKH IRUP RI 5$',86 PHVVDJH RI YDULDEOH OHQJWK KDYLQJ $WWULEXWH 7\SH $WWULEXWH /HQJWK DQG $WWULEXWH 9DOXH 7KLV IRUPV WXSOH LQ ZKLFK $WWULEXWH /HQJWK ILHOG LV RI  RFWHW6RPD[LPXPYDOXHRIGDWDIRUDJLYHQDWWULEXWHGDWDVL]HLVRFWHWV%XW'LDPHWHUEDVHGDWWULEXWHHQKDQFHV PRUH IOH[LELOLW\ WR QHZ DQG XSFRPLQJ WHFKQRORJLHV E\ IRUZDUGLQJ 'LDPHWHU EDVHG PHVVDJH DV D YDULDEOHOHQJWK KDYLQJ $WWULEXWH 7\SH )ODJV $WWULEXWH /HQJWK 9HQGRU ,' DQG $WWULEXWH 9DOXH 7KLV IRUPV WXSOH LQ ZKLFK $WWULEXWH/HQJWKILHOGLVRIRFWHWV6RLWVPD[LPXPYDOXHIRUZDUGVGDWDIRUDJLYHQDWWULEXWHXSWRRFWHWV  2.3.5Error based Message handling and capability negotiation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¶V JRLQJ RQ DQG KRZ WR WHVW ZLWKLQ QHWZRUN )XUWKHU RQH RI WKH JUHDWHVW FKDOOHQJHV IRU WKH 7HOHFRPPXQLFDWLRQ VHUYLFH SURYLGHU LV WR FUHDWH WRSRORJ\ KLGLQJ IHDWXUHV ZLWKLQ GLVWULEXWHG LQIUDVWUXFWXUH)LJXUHEHORZLVLOOXVWUDWLQJWKHVFDOLQJFRPSOH[LW\ZLWKRXW'6&    

Vinay Kumar S.B. et al. / Procedia Computer Science 78 (2016) 415 – 422

419

)LJ6FDOLQJ&RPSOH[LW\ZLWKRXW'6&

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etwork '6& SOD\V YLWDO UROH IRU VDIHJXDUG VXEVFULEHU DFFRXQWLQJ GHWDLOV YLDDXWKHQWLFDWLRQ DQG DXWKRUL]DWLRQ EDVHG QHWZRUN DFFHVV WR XQGHUJR FHQWUDOL]HG VXEVFULEHU PDQDJHPHQW GDWDEDVH HQDEOLQJJUHDWHUYDULDEOH DXWKHQWLFDWLRQ DOWHUQDWLYHDQGSROLF\PDQDJHPHQWLQFDVHRI**VXEV\VWHP'6&DOORZVERXQGDU\WRVXSHUYLVHVXEVFULEHUVLQ WKHQHWZRUNWRPHUJHZLWKGLIIHUHQWEDFNRIILFHKDYLQJFRPPRQELOOLQJV\VWHP 

4.2 3G Network  'LDPHWHU EDVHG SURWRFRO SURYLGHV ,06, EDVHG DXWKHQWLFDWLRQ 7KLV HIILFLHQWO\ VXSSRUWV WKLUG *HQHUDWLRQ 3DUWQHUVKLS3URMHFW*33DVZHOODV*33'6&LVDVVXPHGWREHNH\SURWRFROIRU*1HWZRUNLQRUGHUWRVXSSRUW $$$DQGPRELOLW\PDQDJHPHQWFDSDELOLWLHV7KLVEDVHGDUFKLWHFWXUHHQDEOHVVHUYLFHSURYLGHUVWRJHQHUDWHDGYDQFHG EDVHGGDWDDVZHOODVYRLFHVHUYLFHV'6&IHWFKHVVXEVFULEHUUHJLVWUDWLRQGHWDLOVIURP6,0RU+/5$XWKHQWLFDWLRQ

420

Vinay Kumar S.B. et al. / Procedia Computer Science 78 (2016) 415 – 422

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network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i-Fi

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ire line Network :LUH OLQH 1HWZRUN LPSOLFDWHV $'6/ DQG XSFRPLQJ WHFKQRORJ\ +'6/ D VHUYLFH WKDW SURYLGHV FRPPRQ OLQN DPRQJVHYHUDOEXQGOHGIDFLOLWLHVZLWKEHVWH[SHULHQFHRIWHOHSKRQ\WHOHYLVLRQDQG,QWHUQHWH[SHULHQFHDFFHVVDWKLJK 6SHHGDWWKHVDPHWLPHE\XVHRIWZRIRXUFRSSHUZLUHRUFRD[LDOFDEOH'6&IRUZDUGV3UR[\WRVXSSRUWGLIIHUHQW SUR[LHV HJ $1, '1,6 HWF WR RIIHU PXOWLSOH VHUYLFHV OLNH KLJK VSHHG GDWD WUDQVIHU XQLQWHUUXSWHG VHVVLRQ WR WKH VXEVFULEHUV (WF )XUWKHU '6& SURYLGHV LQWHOOLJHQFH EDVHG ,3 3RRO 0DQDJHPHQW WR PDQDJH D OLVW RI ,3 DGGUHVVHV XQXVHGLQRUGHUWRUHPHG\WKHFRQJHVWLRQZLWKLQ1HWZRUN7KLVIDFLOLWDWHVVXEVFULEHUVWRH[SHULHQFHEHVW4R6ZLWK RSWLPXP QHWZRUN XWLOL]DWLRQ 8VLQJ '6& LW EHFRPHV HDVH WR PDLQWDLQ FHQWUDO EDVHG SUHSDLG DV ZHOO DV SRVWSDLG ELOOLQJ GDWDEDVH RI VXEVFULEHUV ZLWK FRPPRQ OLQN DPRQJ VHYHUDO EXQGOHG IDFLOLWLHV ZLWK EHVW H[SHULHQFH RI WHOHSKRQ\ WHOHYLVLRQ DQG ,QWHUQHW H[SHULHQFHIRU GLIIHUHQW YHQGRUV IRU H[DPSOH $OFDWHO /XFHQW  (ULFVVRQ +XDZHLHWF+RZHYHU WKLV HQDEOHV WKH 6HUYLFH SURYLGHUV WR UHVWULFW WKH VXEVFULEHUV WR FHUWDLQ VHUYLFH OHYHO 6XEVFULEHUV DUH DOVR UHVWULFWHG WR FHUWDLQ QXPEHU RI FRQFXUUHQW VHVVLRQV IRU FHUWDLQ FRQWHQWV RQ WKH EDVLV RI EDQGZLGWKORFDWLRQVDQGWLPHLQWHUYDO$OVR6XEVFULEHUVDUHDEOHWRUHFHLYHUHDOWLPHQRWLILFDWLRQVEURDGFDVWHGDW ULJKWWLPHHJDELOLW\WREURDGFDVWEULHIPHVVDJHDVQRWLILFDWLRQWRDOOVXEVFULEHUVZKHQHYHUWKHSUHSDLGFUHGLWDQG

Vinay Kumar S.B. et al. / Procedia Computer Science 78 (2016) 415 – 422

421

WLPHOLPLWIRUWKHLUVHUYLFHLVJRLQJWRH[KDXVW7KXV'6&SOD\VYLWDOUROHLQPDLQWDLQLQJHDV\FRQILJXUDWLRQRIDOO WKHLQWHJUDWHGVHUYLFHZLWKHIILFLHQWRYHUFRPHRI)DLORYHU/RDGEDODQFLQJDQG+LJK$YDLODELOLW\IHDWXUHV  4.75G/ Li-Fi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etworkWorking Group; 5LJQH\/LYLQJVWRQ::LOODWVIURP&\QR7HFKQRORJLHV3&DOKRXQIURP6XQ0LFURV\VWHPV5$',86([WHQVLRQV5)&IETF Network Working Group;  KWWSOHDUQWHOHFRPFRPGLDPHWHUSURWRFRODQRYHUYLHZ

422

Vinay Kumar S.B. et al. / Procedia Computer Science 78 (2016) 415 – 422

5LJQH\ 6 :LOOHQV $ 5XEHQV : 6LPSVRQ 5HPRWH $XWKHQWLFDWLRQ 'LDO ,Q 8VHU 6HUYLFH 5$',86  5)&  IETF Network Working Group; &KULVWRSKHU 0HW] $$$ 35272&2/6 $XWKHQWLFDWLRQ $XWKRUL]DWLRQ DQG $FFRXQWLQJ IRU WKH ,QWHUQHW IEEE Internet Computing online; S $ERED*=RUQ'0LWWRQ5$',86DQG,3Y5)&IETF Network Working Group KWWSZZZHOLWHDDDFRPDDDIRUBEURDGEDQGZLUHOHVVKWPO 9LQD\.XPDU6%0DQMXOD1+DULKDU'LDPHWHUEDVHG3URWRFROLQWKH,30XOWLPHGLD6XEV\VWHPInternational Journal of Soft Computing and Engineering (IJSCE),9RO,VVXHS  9LQD\.XPDU6% 0DKHQGUD .XPDU 0' 7HVWLQJ RI 'LDPHWHU %DVHG 3URWRFRO LQ WKH ,3 0XOWLPHGLD 6XEV\VWHP International Journal of Engineering and Advanced Technology (IJEAT)9RO,VVXHS  5DF] 3HWHU DQG EXUNKDUG 6WLOOHU ,3 IORZ DFFRXQWLQJ DSSOLFDWLRQ IRU 'LDPHWHUIEEE Transactions on Network and Service Management; S 6XVKLONXPDU6DK6DURM6KDN\D+DULRP'KXQJDQD$6HFXULW\0DQDJHPHQWIRU&ORXG%DVHG$SSOLFDWLRQVDQG6HUYLFHVZLWK'LDPHWHU$$$ International Conference on issues and challenges in Intelligent Computing Techniques(ICICT);S  %DODFKDQGUD 5HGG\ .DQGXNXUL 5DPDNULVKQD 3DWXUL 9 'U $WDQX &ORXG 6HFXULW\ ,VVXHV IEEE International Conference on Services Computing;S '6XQ30F&DQQ+7VFKRIHQLJ77VRX'LDPHWHU4XDOLW\RI6HUYLFH$SSOLFDWLRQ Internet Engineering Task Force(IETF); +DVDQ0G0DKPXGXO6DOHK0RKDPPDG6DJDU:LUHOHVV&RPPXQLFDWLRQWKURXJK/RQJ7HUP(YROXWLRQ /7( RYHUVDWHOOLWHFKDQQHOE\ XVLQJ0,022)600RGHO International Conference on Advances in Electrical Engineering (ICAEE) $NKLO*XSWD5DNHVKNXPDU-KD$VXUYH\RI*1HWZRUN$UFKLWHFWXUHDQG(PHUJLQJ7HFKQRORJLHVAccess, Vol. 3, IEEE 75DSSDSRUW:LUHOHVV&RPPXQLFDWLRQVSULQFLSOHVDQG3UDFWLFH Englewood cliffs, NJ, USA: Prentice-Hall; -*$QGUHZV$*KRVK5PXKDPHGFundamentals of WiMAX: Understanding broadband wireless networking.1st ed. (QJOHZRRG&OLIIV 1-86$SUHQWLFH+DOO .56DQWKL 9. 6ULYDVWDYD *6HQWKLONXPDUDQ$%XWDUH *RDOVRIWUXHEURDGEDQG¶VZLUHOHVVQH[W ZDYH ** SURF IEEE 58thveh. Technol. Conf. YROS