A Collaborative AAA Architecture to Enable Secure Real-World Network Mobility

  • Panagiotis Georgopoulos
  • Ben McCarthy
  • Christopher Edwards
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6640)


Mobile Networks are emerging in the real world in various scenarios, from networks in public transportation to personal networks in consumer electronics. The NEMO BS protocol provides constant network connectivity and reachability for the nodes of these Mobile Networks in a seamless manner despite their roaming. However, NEMO BS has yet to show its advantages in real world deployment because it lacks trouble-free and secure network access for the whole network, and secure data transmission for the nodes it provides connectivity for. On the other hand, Access Networks provide connectivity for Mobile Networks, but currently lack a robust AAA service which would enable network mobility support in a fast, trouble-free, but also secure and authenticated manner. Our paper describes a collaborative Unified Architecture that satisfies the requirements of both Mobile Networks and Access Networks, and our evaluation proves its efficiency and applicability for real world deployment in today’s Internet infrastructure.


Network Mobility NEMO BS AAA RADIUS Security 


  1. 1.
    Aboba, B., Beadles, M., Arkko, J., Eronen, P.: The Network Access Identifier. IETF RFC 4282 (December 2005)Google Scholar
  2. 2.
    Arkko, J., Devarapalli, V., Dupont, F.: Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents. IETF RFC 3776 (June 2004)Google Scholar
  3. 3.
    Hurricane Eectric IPv6 Tunnel Broker,
  4. 4.
    Devarapalli, V., Wakikawa, R., Petrescu, A., Thubert, P.: NEMO Basic Support Protocol. IETF RFC 3963 (January 2005)Google Scholar
  5. 5.
    Funk, P., Blake-Wilson, S.: Extensible Authentication Protocol Tunneled Transport Layer Security (EAP-TTLSv0). IETF RFC 5281 (August 2008)Google Scholar
  6. 6.
    Georgopoulos, P., McCarthy, B., Edwards, C.: Towards a Secure and Seamless Host Mobility for the real world. In: 8th International Conference on Wireless On-demand Network Systems and Services (WONS 2011), Italy (January 2011)Google Scholar
  7. 7.
    Umip Mobile IPv6 Stack,
  8. 8.
    Johnson, D., Perkins, C., Arkko, J.: Mobility Support for IPv6. IETF RFC 3775 (June 2004)Google Scholar
  9. 9.
    Kent, S., Seo, K.: Security Architecture for the Internet Protocol. IETF RFC 4301 (December 2005)Google Scholar
  10. 10.
    de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: Generic AAA architecture. IETF RFC 2903 (August 2000)Google Scholar
  11. 11.
    Perkins, C.: IP Mobility Support. IETF RFC 2002 (October 1996)Google Scholar
  12. 12.
    Rigney, C., Willens, S., Rubens, A., Simpson, W.: Remote Authentication Dia. In: User Service (RADIUS). IETF RFC 2865 (June 2000)Google Scholar
  13. 13.
    Simon, D., Aboba, B., Hurst, R.: The EAP-TLS Authentication Protocol. IETF RFC 5216 (March 2008)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Panagiotis Georgopoulos
    • 1
  • Ben McCarthy
    • 1
  • Christopher Edwards
    • 1
  1. 1.School of Computing and CommunicationsLancaster UniversityLancasterUK

Personalised recommendations