A Secure Relay-Assisted Handover Protocol For Proxy Mobile Ipv6 in 3Gpp Lte Systems
A Secure Relay-Assisted Handover Protocol For Proxy Mobile Ipv6 in 3Gpp Lte Systems
A Secure Relay-Assisted Handover Protocol For Proxy Mobile Ipv6 in 3Gpp Lte Systems
Abstract The LTE (Long Term Evolution) technologies dened by 3GPP is the last step
toward the 4th generation (4G) of radio technologies designed to increase the capacity and
speed of mobile telephone networks. Mobility management for supporting seamless han-
dover is the key issue for the next generation wireless communication networks. The evolved
packet core (EPC) standard adopts the proxy mobile IPv6 protocol (PMIPv6) to provide
the mobility mechanisms. However, the PMIPv6 still suers the high hando delay and the
large packet lost. Our protocol provides a new secure handover protocol to reduce hando
delay and packet lost with the assistance of relay nodes over LTE networks. In this paper,
we consider the security issue when selecting relay nodes during the hando procedure. Dur-
ing the relay node discovery, we extend the access network discovery and selection function
(ANDSF) in 3GPP specications to help mobile station or UE to obtain the information
of relay nodes. With the aid of the relay nodes, the mobile station or UE performs the
pre-handover procedure, including the security operation and the proxy binding update to
signicantly reduce the handover latency and packet loss. The simulation results illustrate
that our proposed protocol actually achieves the performance improvements in the hando
delay time and the packet loss rate.
Keywords LTE mobility handover relay-assisted security
Contract/grant sponsor: National Science Council of the Republic of China; contract/grant number:
NSC-97-2221-E-305-003-MY3 and NSC-98-2219-E-305-001
2 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
1 Introduction
With the rapid growth of personal mobile communications, a mobile device with the user
equipment (UE) connected to the Internet for IP-based multimedia service is signicantly
increased. The LTE (Long Term Evolution) technologies dened by 3GPP is the last step
toward the 4th generation (4G) of radio technologies designed to increase the capacity and
speed of mobile telephone networks. The core network (CN) part of the evolution of the
LTE system is classied into the system architecture evolution (SAE) and the radio access
network (RAN). The main objective of RAN part is to increase the system capacity, the
transmission coverage, the throughput, and reduce the hando latency. The LTE system is
the IP based architecture, in which all radio control functions, such as handover control and
admission control, are enforcement in eNB. LTE system not need the central control entity.
User plane follows the same radio link standards, such as RLC/MAC in eNB.
When a mobile user is roaming between dierent base stations, called as eNodeB (eNB),
of LTE networks, UE needs to perform the handover protocol to keep the data connections.
Traditional handover protocol suers from high handover latency and large packet loss. Our
main objective is to develop a new hando protocol to reduce the handover latency and
improve the packet loss rate.
Fig. 1 illustrates the 3GPP long term evolution (LTE) architecture, which is dened by
3GPP [6]. The LTE is all-IP network architecture to provide higher bit rate, lower trans-
mission latency, and wider service coverage. The 3GPP LTE becomes a major competitive
3GPP connection technology to deal with the rapid development of IP data trac. When
the UMTS system currently builds in the world, the system performance and cost optimiza-
tion must take into account two issues [16]. The rst issue is to upgrade the existing UMTS
performance; for instance, HSDPA standard in 3GPP Release 5 and HSUPA standard in
3GPP Release 6. However, the maximum data rate is 14.4Mbps in downlink and 5.76Mbps
in uplink. Second issue is to develop the evolved radio interfaces, 3GPP dened evolved
UTRA and E-UTRAN, which are packet based network architecture. The main objective of
LTE is to achieve 100Mbps in downlink and 50Mbps in uplink. The evolution of LTE system
is the core network (CN) part. The CN is generally classied into the system architecture
evolution (SAE) and the radio access network (RAN). The most important of RAN is the
increased capacity, the better coverage, the high throughput, and the reduced latency. The
LTE has been introduced IP based architecture, all radio control functions, such as handover
control and admission control, etc., are enforced in eNB.
The main demand of the Evolved Packet Core (EPC) is to provide the IP-layer seamless
mobility, when a UE moves between dierent eNBs. In the EPC standard, proxy mobile
IPv6 based on the network-based mobility mechanism is used to provide mobility issue.
Two methods are dened in LTE EPC standard, known as network-based mobility proto-
col, proxy mobile IPv6 (PMIPv6) [12], and client-based mobility protocol, dual-stack mobile
IPv6 (DSMIPv6) [20] and mobile IPv4 (MIPv4) [19]. Therefore, this paper focus on discussed
how to improve the PMIPv6 handover in the LTE system. A network-based management
protocol, called PMIPv6, is network-based localized mobility management (NetLMM) from
the IETF working group. Unlike MIPv6, PMIPv6 allows controlling the network-based mo-
bility management on the behalf of MN. Therefore, PMIPv6 can remove some MN-related
signalings. However, network-based mobility management, such as PMIPv6, still suers from
the high packet loss and handover latency.
In this paper, we propose a secure relay-assisted handover, called RN PMIPv6, protocol
for proxy MIPv6 in 3GPP LTE networks. The proxy MIPv6 protocol [15] still suers from the
high hando delay and the large packet lost. Our protocol provides a new protocol to reduce
hando delay and packet lost with the assistance of relay nodes over LTE networks. The basic
A Secure Relay-Assisted Handover Protocol 3
UTRAN
3GPP IP access ISC
HSS Application
S-CSCF
Cx Server
GERAN
S6a
PCRF
S1-MME Mw
MME S4/S12 Cx
S11 S7 Rx
idea of the relay node performing the pre-handover procedure is already developed in [8][9]
for IEEE 802.11 networks and IEEE 802.16e systems, respectively. The design dierences of
these protocols are given in Table I. Unfortunately, none of them have considered the security
issue. In this paper, we specically consider the security issue when selecting relay nodes
during hando. During the relay node discovery, we extend the access network discovery
and selection function (ANDSF) in 3GPP specications to help mobile station or UE to
obtain the information of relay nodes. With the aid of the relay nodes, the mobile station
or UE performs the pre-handover procedure, including the security operation and the proxy
binding update to signicantly reduce the handover latency and packet loss. The simulation
results illustrate that our proposed protocol actually achieves the performance improvements
in the hando delay time and the packet loss rate.
The rest of this paper is organized as follows. Section 2 describes related works. Section
3 describes the system architecture and basic idea. The proposed protocol is presented
in section 4. Performance evaluation is discussed in section 5. Section 6 nally gives a
conclusion.
2 Related works
This section rst introduces IPv6-based mobility protocols, including MIPv6, PMIPv6, and
SPMIPv6 protocols. The PMIPv6 protocol in LTE system is then described in Section 2.2.
Mobility management is the most important mechanism in the IP-based next generation
network environment. The MIPv6 [13] protocol necessary to exchange signaling messages
between a UE and the home agent (HA), in order to maintain correspondence between
the permanent IP address and temporary IP address. The client functionality of mobility
support must be provided to the UE in MIPv6 protocol. However, some results discuss
how to improve MIPv6-based handover scheme [18]. The recent advances in network-based
4 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
localized mobility management (NetLMM) have facilitated the realization of All-IP based
wireless networks. In addition, Proxy mobile IPv6 (PMIPv6) [14, 17] is a solution to support
the NetLMM, the network is utilized to perform the location update signalings.
The MIPv6 protocol [18] allows UE to maintain the communications from a correspond-
ing node (CN) to the UE. Each UE used the home address (HoA) to identify its location.
When the connection to the external network, UE may receive the router advertisement to
obtain external network prex and automatically congurations a care-of address (CoA).
After CoA congured, UE then performs the DAD procedure to ensure the unique of the
CoA. If CoA is available, the UE sends the location information to the CN and HA for the
location binding, and then packet tunnels to the new location.
The PMIPv6 protocol [14, 17] allows a UE to maintain the original IP address, which
means the new network has partially extracted by the address prex. The UE does not be
required to perform the IP address conguration if the network connection changes. The
PMIPv6 protocol dened the local mobility anchor (LMA) and the mobile access gateway
(MAG) [15]. All PMIPv6 domains of the mobility management functions are used by LMAs
and MAGs. When a UE moves and connect to the new MAG, the MAG must detect the
connection and initiates the required authentication and authorization procedures to connect
with the network for the IP session for UE. The local mobility anchor (LMA) is similar to the
home agent. The LMA is the topological anchor point, keeps the current UE location binding
information. The mobile access gateway (MAG) acts as a proxy agent and controls the
mobility signalings to LMA. MIPv6 protocol has ability to control the IP handover between
dierent based stations, large handover latency makes MIPv6 protocol cannot be fully used
in the real-time services; such as voice over IP (VoIP) application. The PMIPv6 protocol uses
the network-based mobility management actually reduces the signaling overhead, PMIPv6
protocol still suers the high handover latency and packet loss.
Lee et al. [17] proposed a fast handover for proxy mobile IPv6 based on 802.11 networks.
This scheme uses the conversion scheme by the context information from the previous MAG
to the new MAG by IAPP (Inter-Access Point Protocol) (authentication information, prole
information of UE). With the advanced conversion of the context information, this scheme
can reduce the hando delay.
Kang et al. [14] proposed a seamless handover scheme for proxy mobile IPv6, illustrated
in Fig. 2. This scheme uses the neighbor discovery (ND) messages in IPv6 to reduce the
handover latency. The ND message sends the MN-prole to neighboring MAGs before the
handover operation. This scheme can eliminate the MAGs obtained from policy store (PS)
of the MN-prole procedure when the UE needs handover. To prevent on-the-y packet loss,
this caused by the routing between previous LMA and MAG. A packet buering is needed
on the MAG and LMA to solve the problem of packet loss.
Buffering
LMA
LMA Address (LMAA)
tunnel entry-point
Home Network
nel MNs Home Network
tun
MIP
PMIP tunnel
P
P-MAG
Buffering
Proxy Binding Update (PBU)
Control message sent by MAG to LMA
N-MAG to establish a binding between MN-HoA
and Proxy-CoA
UE movement
The 3GPP LTE standard may adopt the network-based and client-based mobility protocols.
Example of the network-based and client-based mobility protocols are proxy mobile IPv6
(PMIPv6) and MIPv6 protocols, respectively.
In the network-based mobility management, network detects whether a UE has moved
to another point of attachment, and provides the same IP address of the previously point
of attachment to the UE. Network components provide IP addresses to the UE, and control
the mobility anchor updating. Thus, these packets can successfully reach the new point of
attachment. In the client-based mobility management, a UE obtains a new local IP address
or care-of-address if the UE moves to a new point of attachment. Then, the UE updates
the address information to the home agent. Home agent maintains a binding between the
care-of-address and the home address of UE.
The LTE system introduces two functionality entities for supporting the PMIPv6 proto-
col, there are PDN gateway (P-GW) and Serving Gateway (S-GW). First, the PDN gateway
(P-GW) provides the access in dierent packet data networks (PDN). Through the address
space of the PDN, P-GW gives a UE an IP address, which is IPv4 address or IPv6 prex.
The P-GW is a mobility anchor point. The main role of P-GW is the management of IP
address and prex of UE, and also is a role of PMIPv6 LMA. Second, S-GW includes the
MAG functionality of PMIPv6 which is used for the IP mobility management. The S-GW is
also a role of layer 2 mobility anchor. The main function is to detect and control procedures
if a UE moves into the 3GPP access network. The 3GPP standard Release 8 [3] describes
the attachment of UE to EPC. The function of MAG is sending a proxy binding update
(PBU) to the LMA. Thus, the P-GW uses tunnel technique for the downlink packets of UE
to avoid the problem of packet loss. The P-GW provides an IP address/prexes in the proxy
6 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
Internet
CN
HA
GW
pMAP nMAP
AR1 AR2
BS PS BS
MS
BS BS
binding agent (PBA) to the UE. The P-GW uses Generic Routing Encapsulation (GRE)
key, and the S-GW also uses tunnel technique for the uplink packets of UE.
Traditional client-based mobility protocol suers the high signaling overhead. Although,
the network-based mobility protocol improves problem of the heavy signaling overhead. The
network-based mobility protocol, PMIPv6, still suers the high handover latency and packet
loss. Eorts made in this work is to develop a secure relay-assisted handover protocol for
PMIPv6 in 3GPP LTE Systems to signicantly improve the handover latency and packet
loss. One main contribution of this work is to develop a new relay-assisted handover protocol
with consideration of the security for PMIPv6 in 3GPP LTE Systems.
3 Preliminary
This section initially describes the handover procedure dened in 3GPP LTE [7]. The system
architecture and the challenge are then explained. The basic idea is nally introduced.
The mobility management of the 3GPP LTE standard has been dened in [7]. The control
plane handling during the E-UTRAN mobility activity for UEs is done by the handover
preparation signaling which is a part of the handover command to the target eNB, as follows.
The preparation work of handover is that source eNB sends all necessary information; for
instance, RRC (radio resource control context information; to the target eNB. Source eNB
and UE retain some context; for instance, C-RNTI (cell radio network temporary identier)
information. The UE connects to target cell by the random access channel (RACH) by a ded-
icated contention-free procedure using the RACH preamble or dedicated contention-based
procedure if RACH preamble cannot be used. The UE uses the dedicate RACH preamble
until the handover procedure is initiated. If the target cell in the RACH procedure is not
A Secure Relay-Assisted Handover Protocol 7
Internet IMS
Server
IPsec
SGi S14
ANDSF
S5 l PM
ne IP S8
tun P-GW1 tun
IP nel
PM
MME1/S-GW1 (LMA) MME2/S-GW2
KNASenc
(MAG) HPLMN VPLMN (MAG)
S6a S6a
[da
[d
ata
ta ]
KN
]K
HSS/AuC AS
N
e nc S1
A
S1
Se
S1 _N
nc
EW
_O
LD
X2 X2
KRRCenc EW
[da
_N
nc
Se
eNB2
ta]
A eNB3
eNB1 a]K
KA
t
KASenc=KUPenc+KRRCenc [da
Se
nc_O
LD
UE1 [data]KRelay-enc
UE2/RN1
P-GW: PDN Gateway LMA: Local Mobility Anchor MME: Mobile Management Entity AuC: Authentication Center HPLMN: Home Public Land Mobile Network
S-GW: Serving Gateway MAG: Mobile Access Gateway HSS: Home Subscriber Server RN: Relay Node VPLMN: Visit Public Land Mobile Network
successful, the UE begins to select the best cell from the radio link recovery. In the handover
procedure, the header compression (ROHC) context exchange is not robust. It is noted
that handover procedure not negotiate with EPC, and the preparation messages directly
exchanged between eNBs.
The user plane handling during the E-UTRAN mobility activity for UEs is to avoid the
data loss during handover. When the handover preparation is done, the user plane tunnel is
built between the source eNB and the target eNB. The establishment of tunnels is used to
transmit uplink and downlink data. When the handover execution, user data is re-forward
from the source eNB to the target eNB. When the handover completion, the target eNB
sends and informs to the MME a path switch message to perform the path switch. The
MME sends a user plane update request message to the serving gateway, thus the path of
user-plane from the serving gateway is switched to the target eNB.
The system architecture of our scheme is illustrated in Fig. 4, where is the 3GPP LTE
system environment. In this study, network-based mobility protocol, proxy mobile IPv6, is
considered as the mobility management in the 3GPP LTE systems. A little portion of the
components of LTE system needs to increase its functionality. When a UE with the weak
signal strength received from the serving eNB to enable the handover procedure, but still
not reach to the coverage of neighbor eNB. The UE tries to nd out some UEs located at
the coverage of neighbor eNB. Such UEs is called as relay node (RN). The functionality of
8 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
S14
3GPP IP Access or
UE ANDSF+
Trusted/Untrusted
Non-3GPP IP Access
the RN is to help the UE to perform the pre-hando procedure and to reduce the hando
latency. The formal denition of RN is given.
Denition 1: Relay Node (RN): Given a UE located at serving eNB, all possible neighbor
UEs of the UE located at the coverage of neighboring eNB are called as relay nodes or
RNs of the UE, where the UE can directly communicate with all relay nodes (RNs).
The main function of the RN is to assist the UE to pre-perform the partial handover
procedures which is defined in the 3GPP LTE Intra E-UTRAN mobility.
If a UE needs the assistance from a RN, the rst task for the US is to search for useful
RNs. This task is called as the RN discovery. The main goal of the RN discovery is to nd the
best RN for the UE. The 3GPP LTE specications introduces the access network discovery
and selection function (ANDSF) [4], illustrated in Fig. 5. The main function of ANDSF is to
search for the suitable neighbor access networks. Our RN discovery is utilized the ANDSF
and add additional information table in the ANDSF to be ANDSF+ . The formal denition
of ANDSF+ is given as follow.
Denition 2: ANDSF+ : Given an access network discovery and selection function (ANDSF)
[4]. The ANDSF + is an ANDSF and appended additional information table into the
ANDSF. The main function of ANDSF + is used for a UE to execute the relay node
discovery.
The RSSI of the eNB downlink to the UE must less than RSSIthreshold to ensure that
the UE is nearly in boundary of the neighbor eNBs coverage.
The UE is stable.
The UE belongs to dierent eNBs.
The UE supports the ad hoc communication capability.
The UE provides the location information.
A RN is near to the edge of the coverage of serving eNB, because the major function
of RN is viewed as an extension coverage to the next eNB to assist the UE to pre-perform
the handover procedure. The second condition is that the RN must be stable, not moving
rapidly. This ensures the selected RN can be stable for a long period of time. The third
condition is that the RN is belong to the dierent eNB domain. The last one is that the
RNs must support the ad hoc communication with the UE. In addition, Fig. 6 also gives the
protocol stack. This gure shows that our protocol stack is modied from the 3GPP LTE
specications. Ad hoc communication interface between the UE and RN is also illustrated
in the protocol stack.
A Secure Relay-Assisted Handover Protocol 9
Application
IP IP IP IP
Relay Relay
Tunnelling
PDCP PDCP PDCP GTP-U GTP-U Tunnelling
Layer
Layer
IPv4/IPv6
RLC RLC RLC UDP/IP UDP/IP IPv4/IPv6 IPv4/IPv6
L1 L1 L1 L1 L1 L1 L1 L1
This work mainly improves the results from [8][9]. There are partner-based hando proto-
cols in IEEE 802.11 [8] and IEEE 802.16 [9], respectively. In [8], Chen et al. proposed a
cross-layer partner-based fast hando mechanism for IEEE 802.11 wireless networks. In [9],
Chen et al. proposed a cross-layer partner-assisted hando scheme for hierarchical mobile
IPv6 in IEEE 802.16e systems. Unfortunately, these two partner-based hando protocols do
10 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
not consider the security issue. Therefore, it is not guarantee the reliable and safety data
transmission if the protocol design not further consider the security issue. This is because
that the data transmission is done through possible non-reliable and no-safety relay nodes.
The main motivation of this work is to consider the security issue to develop a secure realy-
assisted hando protocol. Two contributions of this work is developed; (1) one is to develop
a new network-based mobility protocol with the assistance of relay node in LTE systems, (2)
another one is that a security scheme is investigated for the communication between UE and
RN. Fig. 7 gives the LTE key hierarchy. In this work, Because of add RN in this protocol,
we modied specications to enhance the secure communication between UE and RN. The
usage of RN is execute the partial handover procedures for UE before the UE entering the
coverage of the target eNB. This idea mainly comes from result from [8][9]. The comparison
of existing results with our new approach is given in Table I.
The basic idea is stated as follows. The goal of RN is to assist UE to pre-execute par-
tial handover procedures before the UE entering the target eNB coverage of a new public
land mobile network (PLMN) domain. In the 3GPP LTE standard [2], UE handover proce-
dures is divided into two modes; there are X2-based (intra-domain handover) and S1-based
(inter-domain handover) handover procedures. The standard handover process is divided
into three phases; (1) handover preparation, (2) handover execution, and (3) handover com-
pletion. Initially, the handover execution phase contains some important security operations.
The security operation includes that a target eNB not only performs the encryption and de-
cryption algorithms, but also check the new authentication key. The security operation is
to ensure the safely handover procedure to the target eNB. The handover completion phase
performs the operations of proxy binding update (PBU) and proxy binding acknowledge-
ment (PBA). The PMIPv6 tunnel between eNB and serving gateway (S-GW) achieves the
network-based mobility. The handover latency and packet loss caused during the handover
procedure. Eorts will be made to develop a security RN-based procedure of the PMIPv6
binding procedure.
The secure relay-assisted handover protocol for PMIPv6 in 3GPP LTE systems is split into
relay node discovery phase, secure communication phase, secure relay-assisted handover
phase, as follows.
Relay node discovery phase is to discover RNs by the UE. Because of the RN coverage
extension of the neighbor eNBs, the UE detects and identies the existence of all possible
RNs located at neighbor eNBs before entering the transmission range of next eNB by
negotiating with ANDSF+ . With the assistance of the RN, the UE pre-perform partial
layer 3 hando procedures before the UE entering into the transmission range of target
eNB.
A Secure Relay-Assisted Handover Protocol 11
S6a S6a
Reg Node
Rel gister
ister
Re
ay N
S1 S1
y
Rela S1 HSS/AuC
ode
S1
Rel
X2
ay N
UE3/RN2
ode
eNB1 eNB2
Reg
UE1
iste
r
X2
X2
UE2/RN1
UE4/RN3
eNB3
RSSIth
Secure handover phase establishes a security mechanism to provide the secure commu-
nication between UE and RN during the handover.
Secure relay-assisted handover phase provides a complete relay-assisted handover proto-
col with security for PMIPv6.
action
To explain the secure operation of the relay-assisted handover protocol, let X = Y
denote that X executes a communication action to Y , where X and Y ={UE, RN, ANDSF,
CN, source eNB, source MME, target eNB, target MME} and communication action =
{forward, register, negotiation, request, response}. The detailed operations are described as
follows.
The main task of this phase is to discover the relay node when UE needs to handover to
the target eNB. A relay discovery scenario is given in Fig. 8. The operation of relay node
discovery is given.
12 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
Internet IMS
Server
SGi S14
ANDSF
S5 S8
P-GW1
MME1/S-GW1 (LMA) MME2/S-GW2
(MAG) (MAG)
HPLMN VPLMN
S6a S6a
Req Info.
uest
S1 S1
y
Rela
HSS/AuC
X2
UE3/RN2
eNB1 eNB2
UE1
Relay Infomation
X2
X2
eNB3
RSSIth
register
S1: UE = ANDSF+ : Before the UE inquiring the RN information from ANDSF+ ,
each UE registers its information to ANDSF+ . These information includes UE name,
eNB information, RSSI strength, mobility information, ad hoc or infrastructure modes,
and the location information. These information stores in the table of the ANDSF+
database, as illustrated in Fig. 8.
query
S2: UE = ANDSF+ : The UE inquiries the RN information from ANDSF+ . The UE
sends a request message to ANDSF+ . When the UE not reach to coverage of all possible
target eNB. Observe that, now UE still not determine the nal target eNB. Logically,
the usage of RN is to extend to the coverage area of target eNB, as illustrated in Fig.
9. The UE sends a request to ANDSF+ , and received RN information from ANDSF+ .
By the location information of RNs, the UE discovers the closest RN as the candidate
of RN.
negotiation
S3: UE = RN : When the UE obtained the candidate of RN, the UE has to decide
target eNB. After determining the nal target eNB, the UE selects one best RN from
A Secure Relay-Assisted Handover Protocol 13
Internet IMS
Server
SGi S14
ANDSF
S5 S8
P-GW1
MME1/S-GW1 (LMA) MME2/S-GW2
(MAG) (MAG)
HPLMN VPLMN
S6a S6a
S1 S1
HSS/AuC
X2
eNB1 R eNB2
neg elay
otia
tion
UE1
Relay Infomation
X2
X2
eNB3
RSSIth
many RN candidates, by the signal strength, in the nal target eNB domain. Then,
the authentication mechanism is performed to improve the security of the UE-to-RN
connection.
Example can be seen in Fig. 10, UE2 is a RN (RN1 ) of UE1 if the target eNB is eNB2
and UE4 is a RN (RN3 ) of UE1 if the target eNB is eNB3 .
This subsection aims to establish a security mechanism to provide the secure communication
between UE and RN during the handover.
Before describing the security mechanism with consideration of relay nodes, a secure
handover procedure, including authentication key and encryption key, is investigated as
follows. Through the key exchange procedure, the authentication operation is done during
14 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
UE Source Target
Source eNB Target eNB MME MME
Measurement report
HO decision
the handover. With the authentication key and encryption key, the UE can safely transmit
data to the target eNB. Fig. 11 [6] shows the detailed message ow of the LTE handover
procedure with security. The detailed steps are described as follows.
S1: When a source eNB initiates a handover procedure. The source eNB creates an authen-
tication key. Source eNB calculates a hash function over the current KeN B and cell ID
of target eNB to have KeN B .
request
S2: Source eNB = source MME : The KeN B is sent by source eNB through the han-
dover request message to the source MME.
request
S3: Source MME = target MME : Source MME sends KeN B and related security in-
formation of MME (KN AS , COUNT, KASME ) by the handover request message.
request
S4: Target MME = target eNB : Target MME uses KeN B and KASME to calculate
KeN B+ , from the denition of generated key deviation function [5]. Target MME adds
KeN B+ and the information of RRC/UP algorithm in handover request message and
then is transmitted to the target eNB.
response
S5: Target eNB = target MME : Target eNB selects a target MME permitted by the
selected RRC/UP algorithm. Target eNB returns the handover response to the target
MME. The handover response message contains new C-RNTI and selected RRC/UP
algorithm. Target eNB uses C-RNTI and KeN B+ to compute a new KeN B , by the key
deviation function [5].
A Secure Relay-Assisted Handover Protocol 15
Internet IMS
Server
IPsec SGi
S14
ANDSF
S5 nel PM S8
IP
tun P-GW1 tun
M IP nel
P
MME1/S-GW1 (LMA) MME2/S-GW2
(MAG) (MAG)
HPLMN VPLMN
S1 S1 KeNB*+ KeNB*
[dat
S6a S6a
_OL
HO request HO response
Senc
a]K
KeNB*+KNAS ]KNA
C-RNTI+ KAS+ KNAS
NA
HSS/AuC
Se n
[data
c_N
EW
X2
KeNB* KeNB
[da KNAS: KNASint, KNASenc
eNB1 ta] _N
EW eNB2
K AS Se
nc
KAS: KASint, KASenc
KA
ta]
en
c_
[da
OL
D
KASenc=KUPenc+KRRCenc
UE1
1. KeNB*+ KeNB* KeNB
2. New KeNB KeNB*+ and C-RNTI
3. KAS new KeNB
response
S6: Target MME = source eNB : Target MME sends the handover response back to
the source MME and the source eNB. The handover response information contains the
selected C-RNTI and the MME safety information (NAS-MAC).
HOcommand
S7: Source eNB = UE : Source eNB receives the handover response message, the
handover command message then is transmitted to the UE, it contains a C-RNTI, the
target domain of the NAS, and AS new safety information. The UE uses the information
from handover command message to generate KeN B+ . The UE uses KeN B+ and C-RNTI
to produce the target domain KeN B . After having the target domain KeN B , then we can
have KRRCenc , KRRCint ,and KUP enc .
HOconf irm
S8: UE = target eNB : The UE sends the handover conrm message and new RRC
key to the target eNB if the handover is completed.
Fig. 12 shows an example of the LTE handover procedure with security. The source
eNB initially knows the UE into the cell boundary region. The UE initiates the handover
procedure. Fig. 12 shows the data transmission of encryption key, the usage of encryption
between source eNB, source MME, target eNB, and target MME. Fig. 12 mainly shows how
to have the keys of KAS and KN AS , where KAS is used for many communication protocol,
such as the radio resource control (RRC) and the packet data convergence protocol (PDCP).
The KN AS is mainly used for the communication service link set up protocol, mobility
16 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
UE Relay Node
Source eNB Source Target Target eNB
1. Derive KRelay from MME MME
KeNB and Relay SSID
Derive KeNB* from KeNB
2. Relay request (KRelay)+Relay
encryption algorithm 2. Relay request (K eNB*, KRelay)+NAS keys+Relay encryption algorithm
Select C-RNTI and
RRC/UP algorithm
2. Relay request (KRelay)Relay
encryption algorithm
3. Derive KRelay enc from
KRelay and C-RNTI and
Relay encryption
algorithm
4. Relay response (C-RNTI)
4. Relay response (C-RNTI, selected RRC/UP algorithms) + selected NAS algorithms)
5-1. KRelay enc C-RNTI, create
connection
5-2. KeNB*+ KeNB* KeNB
5-3. New KeNB KeNB*+ and C-RNTI
5-4. KAS_RN new KeNB
5-5. KNAS_RN NAS_MAC
management (MM), and GPRS mobility management (GMM). The source eNB generates a
key KeN B which is used for the certication.
In the following, the detailed operations of security of handover procedure by adding the
relay node (RN) is presented. Fig 13 illustrates the message ow of the security of handover
procedure with the relay node (RN). It is observed that two new security keys, KRelay and
KRelay enc , are generated to guarantee the secure communication for the relay nodes.
S1: The UE generates KeN B and simultaneously performs the relay node discovery to nd
SSID of RN to obtain an authentication key, KRelay , to verify with the selected RN.
request
S2: UE = RN : After the UE obtaining KRelay , the information of KRelay and en-
cryption algorithms used by the RN are added into the relay request message, and the
relay request message is sent through the LTE core network to the target eNB. Target
MME appends KeN B+ and the information of RRC/UP algorithm into the handover
request message, and then sent to the target eNB. The target eNB selects the permitted
RRC/UP algorithm from the handover request message.
S3: When a RN receives KRelay and encryption algorithm from the relay request mes-
sage. The RN uses the received information and C-RNTI of target eNB to re-produce
KRelay enc . This is used the data encryption key between the UE and RN.
response
S4: RN = UE : The RN reply relay response message, which contains the C-RNTI of
target cell information, to the UE.
S5: The UE receives the relay response message and produced KRelay enc by the received
C-RNTI information. Then, the UE and the RN have two keys, KRelay and KRelay enc .
Establish a connection using these two keys for the secure communication. Then, UE
uses the information of relay response message to generate KeN B+ , and then use KeN B+
and C-RNTI to generate KeN B . Finally, the UE keeps KeN B , KRRCenc , KRRCint , and
KUP enc .
A Secure Relay-Assisted Handover Protocol 17
Internet IMS
Server
IPsec SGi
S14
ANDSF
S5 PM S8
el IP
unn P-GW1 tun
I Pt nel
PM (LMA)
MME1/S-GW1 MME2/S-GW2
(MAG) (MAG)
HPLMN VPLMN
S1 S1
2. Relay Request S6a S6a 4. Relay Response
[dat
U
enc_
KRelay+KeNB*+KNAS+Relay C-RNTI+ KAS+ KNAS
a]K
encryption algorithm
S
]KNA
HSS/AuC
NAS
[data
enc_
RN
KeNB* KeNB X2
[da
ta]
eNB1 _ RN eNB2
enc
K
AS
AS
K
ta] KNAS: KNASint, KNASenc
e
[da
nc_
KASenc_RN=KUPenc+KRRCenc
5-1.KRelay enc C-RNTI, create UE2/RN1
connection n c
y-e
5-2. KeNB*+ KeNB* KeNB ela 3.KRelay- enc (KRelay , C-RNTI,
UE1 ta]
KR
[da
5-3. New KeNB KeNB*+ and C-RNTI Relay encryption algorithm)
5-4. KAS_NEW new KeNB
1. KRelay (KeNB ,
5-5. KNAS_NEW NAS_MAC
Relay SSID)
This subsection describes the secure relay-assisted hando protocol for PMIPv6. The main
contribution of the proposed scheme is to improve the hando latency and packet loss with
18 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
UE decide to
attach target eNB
and selected RN Relay Nde
Fig. 15 The message flow of relay-assisted handover with security for PMIPv6.
the assistance of RN. If a UE cannot nd out any RN, our scheme can automatically switches
to default LTE hando procedure to ensure that the UE can successfully perform the secure
handover operation. The message ow of the secure relay-assisted handover procedure is
given in Fig. 15. The detailed steps are also given below.
action
S1: UE = ANDSF+ : The relay node discovery phase is performed and described in Sec-
tion 4.1. The UE obtains a list of the RN candidates. The UE chooses a RN belongs to
target eNB, and nally selects the best RN from the RN candidates.
action
S2: UE = RN : The secure handover phase is performed and introduced in Section 4.2.
When a UE selects the RN for the pre-handover, the UE must establish a secure UE-RN
connection.
action
S3: Source eNB = target S-GW : The step is the handover preparation. The source
eNB sends the handover request to source MME. The source eNB sets bearers of data
forwarding. The target MME forward the handover request message to target eNB.
This message creates the UE context information by the used target eNB, including
information of bearers. Observe that, step 2 pre-executes the secure process to reduce
the handover preparation time.
P BU
S4: Target eNB = P-GW : The step is the pre-handover procedure. The UE has the
assistance from RN. The UE performs pre-handover procedure. The target eNB sends
path switch request message to target MME. The target MME sends update bearer request
message to serving gateway. Then serving gateway sends proxy binding update message
A Secure Relay-Assisted Handover Protocol 19
to PDN gateway. The PDN gateway prior switches path to target domain. Secure data
trac goes though RN to UE.
handover
S5: UE = target MME : The step is the handover execution. The source MME sends
a handover command message to the source eNB. This step ensures that the handover
preparation is executed. The source sends a command to inform UE to start layer 2
handover procedure.
switch
S6: UE = PDN Gateway : The step is the handover completion. With the assistance of
RN, the handover procedure is pre-executed. When UE knows that the layer 2 handover
procedure is nished, the UE sends path switch request message to the serving gateway.
The serving gateway switches path to UE.
T AU
S7: UE = HSS : The step is the tracking area update procedure. The target MME knows
that the handover procedure has been executed, the source eNB releases resource of the
UE and responds context release complete message.
5 Performance evaluation
In this section, the mathematical analysis and simulation results are described.
The handover latency, packet loss, location update cost of our proposed scheme are analyzed.
The variables and notations followed the system parameters dened from [8][21], and given
in Table II.
Let DL2 denote as the layer-2 handover latency, let DLT E OP be the execution delay of the
LTE handover preparation procedure, including bearer setup procedure and location update
procedure. The handover latency of PMIPv6, THO,P MIP , is derived as follow.
20 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
where DL3 is layer-3 handover delay latency, including the delay time of the proxy
binding update and time cost of packet transmissions between UE and serving gateway. In
addition, DHO Security is the processing time of LTE handing with security procedure during
handover. The tP BU is
tP BU = 2tS GW P GW + tLMA OP ,
(2)
where tS GW P GW is the delay time for packet transmission between serving gateway
and PDN gateway, and tLMA OP is the proxy binding update request time for LMA. The
tS GW P GW is
tS GW P GW = n ( BWwire
Sctr
+ Lwire LT E ) + tD internet ,
LT E (3)
where Sctr is the average size of the control message, BWw LT E is the bandwidth of
wired link, Lw LT E is the latency of wired link, tD internet is the average delay of a packet
traveling in Internet. The handover of PMIPv6 is
Let t1 be the time dierence between THO,P MIP and THO,RN P MIP .
Observed that t1 > 0 illustrates that the handover latency of RN PMIPv6 is better
than PMIPv6. Let t2 be the time of dierence between THO,SP MIP and THO,RN P MIP .
Observed that t2 > 0 illustrates that the handover latency of the RN PMIPv6 is better
than that of seamless PMIPv6.
Let p be the packet arrival rate [21], where be the Poisson random variable. The number
of packet loss is counted under the packet lost is exponentially distribution. The number of
lost packet during handover of is
The seamless PMIPv6 protocol utilizes the buering scheme. Let Buf f erMAG,LMA de-
note the packet buer size of LMA and MAG. The number of lost packet during handover
of seamless PMIPv6 is
Our scheme adopts the RN to perform the pre-handover procedure. The number of lost
packet during handover of our scheme is
The system parameters are followed the similar denitions from [21]. Let is the UE call
to mobility ratio, = p/t, where p denotes the call arrival rate. The mean stay time
of UE in a cell is 1/t second. Let CU be the average cost of location update to the LMA.
The cost is the delay of the signaling messages, including the transmission and propagation
delay. Let CS be the cost of security procedure during a UE moves from one serving eNB to
target eNB. Let CL be the cost of establishing a direct connection between serving MAG and
target MAG in the seamless PMIPv6 protocol. Let (i) be the probability of a UE moving
i steps between two consecutive packet arrivals, where (i) is the exponential distribution.
The probability density function is dened as f (x) = ex . The location update cost of
PMIPv6 is
CU + CS
CP MIP = i(CU + CS )(i) =
i=0
The seamless PMIPv6 protocol reduces the packet lost by forwarding the packets from
serving MAG to the target MAG, and from LMA to the target MAG. There is additional
signaling cost to establish a direct connection between the serving MAG and the target
MAG. The location update cost of seamless PMIPv6 protocol is
CU + CL + CS
CSP MIP = i(CU + CL + CS )(i) =
i=0
Our proposed protocol needs more control packets for handling with the RNs to consider
the security issue. The location update cost of our proposed protocol is
CU + CR + 2CS
CRN P MIP = i(CU + CR + 2CS )(i) =
i=0
CN
P-GW
(LMA)
UE
are assumed to be 50km and 100 Mbps. A cbr (udp) trac application between CN to UE
is 0.01 second intervals in our simulation. In addition, a snier program was developed to
estimate the hando delay times for all implemented protocols. The performance metrics to
be observed are:
Handover latency (HL): The handover latency is the delay time from a UE disconnects
the serving eNB, then re-connects to the target eNB, and to receive data packet from
CN through target eNB.
Packet loss (HL): The packet loss counts from the UE disconnecting to serving eNB to
receiving new packets from the target eNB.
Handover jitter (HJ): The handover jitter is the jitter that counts during the handover
time. Assumed that three consecutive packets, Pi2 , Pi1 and Pi are received by UE.
Let Ti2 , Ti1 and Ti denote the time to receive packets Pi2 , Pi1 and Pi . Therefore,
handover jitter is HJj2 = (Ti Ti1 ) (Ti1 Ti2 ) = Ti 2Ti1 + Ti2 .
Location update cost (LUC): The location update cost is the total number of signal
messages for a UE roaming from the serving eNB to the target eNB.
Before describing the simulation results of handover latency, we give the simulation results of
the sequence number below. Fig. 17 illustrates the simulation results of the sequence number
vs time for PMIPv6, SPMIPv6 and RN PMIPv6, protocols. Fig. 17 shows the simulation
24 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
100
PMIPv6
90 SPMIPv6
RN_PMIPv6
80
70
Sequence number
60
End handover of RN_PMIPv6
50
Start handover
40
30
End handover of PMIPv6
20
End handover of SPMIPv6
10
Receive buffer packet
0
0 100 200 300 400 500 600 700 800 900 1000
Time (ms)
800
PMIPv6 PMIPv6
600 SPMIPv6 SPMIPv6
700
RN_PMIPv6 RN_PMIPv6
PMIPv6A
500 SPMIPv6A 600
Handoff latency (ms)
Handoff latency (ms)
RN_PMIPv6A
500
400
400
300
300
200 200
100
100
0
2 4 6 8 10 12 14 16 18 20 200 250 300 350 400 450 500 550
Number of handover PBU time (ms) CI = 90%
(a) (b)
Fig. 18 The performance of handover latency vs (a) number of handover, (b) proxy binding update time.
results of the sequence number vs time. We observed that from the start hando time
to hando time of PMIPv6, SPMIPv6 and RN PMIPv6, the RN PMIPv6 scheme receives
packets from the UE earlier than that of PMIPv6 and SPMIPv6. The curves of PMIPv6,
SPMIPv6 and RN PMIPv6 start the hando at a time of 180 ms. The RN PMIPv6 receives
the new packets at a time of 250 ms which was lower than the SPMIPv6 at a time of 295
ms and PMIPv6 at a time of 390 ms. This is because that RN PMIPv6 has the assistance
of relay nodes.
Fig. 18(a) and Fig. 18(b) illustrate the simulation results of handover latency vs. number
of handover and proxy binding update time for the PMIPv6, SPMIPv6 and RN PMIPv6 pro-
tocols. Fig. 18(a) shows that the average HL values were in the following order: RN PMIPv6
< SPMIPv6 < PMIPv6 from the perspective of number of handover. This veries that the
and our RN PMIPv6 protocol had better HL than the other protocols. Figure 18(a) also dis-
plays the use of mathematical analysis for the PMIPv6-A, SPMIPv6-A, and RN PMIPv6-A.
A Secure Relay-Assisted Handover Protocol 25
600
PMIPv6 PMIPv6
900
SPMIPv6 SPMIPv6
RN_PMIPv6 RN_PMIPv6
500 800
700
Handoff latency (ms)
300 500
400
200
300
100 200
100
0
60 80 100 120 140 160 180 200 220 5 10 15 20 25 30 35
Distance between LMA and MAG (ms) CI=90% Distance between serving MAG and target MAG (hops) CI=90%
(a) (b)
Fig. 19 The performance of handover latency vs (a) distance between LMA and MAG, (b) distance between
serving MAG and target MAG (hops).
It was nearly the same as our implementation as illustrated by the curves of PMIPv6 and
PMIPv6-A about 400 ms, the curves of SPMIPv6 and SPMIPv6-A about 300 ms, and the
curves of RN PMIPv6 and RN PMIPv6-A about 100 ms.
Fig. 18(b) shows the handover latency under various proxy binding update (PBU) time.
In general, the HL increases as the PBU time increases. We observe that PMIPv6 and
SPMIPv6 has the curves of HL between 410900 ms and 305710 ms, but the curve of
RN PMIPv6 was around 100 ms. This is because that the RN PMIPv6 can eliminate the
partial proxy binding update time due to the assistance of relay node (RN).
Fig. 19(a) illustrates the handover latency vs distance between LMA and MAG, for
the PMIPv6, SPMIPv6 and RN PMIPv6 protocols. For each case, the higher the distance
between LMA and MAG, the higher the HL. Fig. 19(a) shows that the average HL values
were in the following order: RN PMIPv6 < SPMIPv6 < PMIPv6 from the perspective of
distance between LMA and MAG. Fig. 19(b) illustrates the handover latency vs. distance
between serving MAG and target MAG. For each case, the higher the distance between
serving MAG and target MAG, the higher the HL. Fig. 19(a) shows that the average HL
values were in the following order: RN PMIPv6 < SPMIPv6 < PMIPv6 from the perspective
of distance between serving MAG and target MAG.
Fig. 20(a) illustrates the mathematical analysis and simulation result of packet loss vs the
number of handover. In general, the PL increased as the number of handover increases.
The RN PMIPv6 has low packet loss that of PMIPv6 and SPMIPv6. Is is observed that
SPMIPv6 has lower packet loss if the number of handover is less. This is because that the
buering scheme is used in SPMIPv6 with extra hardware cost. It was nearly the same as
our implementation as illustrated by the curves of PMIPv6 and PMIPv6-A , the curves of
SPMIPv6 and SPMIPv6-A, and the curves of RN PMIPv6 and RN PMIPv6-A.
Fig. 20(b) displays the simulation result of PL vs PBU time. The PL increased as PBU
time increases. The RN PMIPv6 has low packet loss that of PMIPv6 and SPMIPv6. Is is
26 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
45 35
PMIPv6 PMIPv6
SPMIPv6 SPMIPv6
40
RN_PMIPv6 30 RN_PMIPv6
PMIPv6A
35
SPMIPv6A
RN_PMIPv6A
30
20
25
20 15
15
10
10
5
5
0 0
2 4 6 8 10 12 14 16 18 20 200 250 300 350 400 450 500 550
Number of handover PBU time (ms) CI = 90%
(a) (b)
Fig. 20 The performance of packet loss ratio vs (a) distance between LMA and MAG, (b) proxy binding
update time.
600 800
PMIPv6 PMIPv6
SPMIPv6 SPMIPv6
700
RN_PMIPv6 RN_PMIPv6
500
600
Handoff jitter (ms)
Handoff jitter (ms)
400
500
300 400
300
200
200
100
100
0 0
60 80 100 120 140 160 180 200 220 200 250 300 350 400 450 500 550
Distance between LMA and MAG (ms) CI=90% PBU time (ms) CI = 90%
(a) (b)
Fig. 21 The performance of handover jitter vs (a) distance between LMA and MAG, (b) proxy binding
update time.
observed that SPMIPv6 has lower packet loss if PBU time is small. This is because that the
buering scheme is used in SPMIPv6 with extra hardware cost.
Fig. 21(a) and Fig. 21(b) illustrate the simulation result of handover jitter vs distance be-
tween LMA and MAG, and PBU time for PMIPv6, SPMIPv6 and RN PMIPv6 protocols.
The HJ was measured as the time from the serving eNB to the target eNB. Traditional
A Secure Relay-Assisted Handover Protocol 27
4
x 10
4
PMIPv6
SPMIPv6
3.5
RN_PMIPv6
PMIPv6A
3 SPMIPv6A
1.5
0.5
0
1 0
10 10
Call to mobility ratio ()
wireless-link delay time between the UE and target eNB is between 10 ms and 50 ms. Fig.
21(a) illustrates that PMIPv6 has the highest jitter compared to SPMIPv6 and RN PMIPv6.
The curve of RN PMIPv6 was lower than those of SPMIPv6 and PMIPv6. The average han-
dover jitter values were in the following order: RNPMIPv6 < SPMIPv6 < PMIPv6 from
perspective of distances between LMA and MAG. Fig. 21(b) also illustrates the handover jit-
ter vs PBU time. The average handover jitter values were in the following order: RNPMIPv6
< SPMIPv6 < PMIPv6 from perspective of PBU time. This is because the overlapping result
caused by the relay node for our relay-assisted design can signicantly reduce the HJ.
Fig. 22 illustrates mathematical analysis and simulation result of the location update cost
(times) vs. the call to mobility ratio for PMIPv6, SPMIPv6 and RN PMIPv6 protocols, while
the x-axes sets to be the logarithmic scale. It is observed that the result is not-linear. The
increase in packet arrival to mobility ratio means that the movement of UE becomes slower.
In general, the LUC drops as the call to mobility ratio increases. The average LUC were in
the following order: RN PMIPv6 > SPMIPv6 > PMIPv6. The mathematical analysis of LUC
were in the following order: RN PMIPv6-A > SPMIPv6-A > PMIPv6-A. This shows that
RN PMIPv6-A needs more location update cost than that of SPMIPv6-A and PMIPv6-A
due to the relay node managements.
6 Conclusion
In this paper, we presented a new protocol to reduce hando delay and packet lost with the
assistance of relay nodes over LTE networks. We considered the security issue when selecting
relay nodes during hando. During the relay node discovery, we extend the access network
discovery and selection function (ANDSF) in 3GPP specications to help mobile station or
UE to obtain the information of relay nodes. With the aid of the relay nodes, the mobile
station or UE performs the pre-handover procedure, including the security operation and
the proxy binding update to signicantly reduce the handover latency and packet loss. The
28 Yuh-Shyan Chen*, Tong-Ying Juang, Yao-Tsu Lin
simulation results illustrated that our proposed protocol actually achieves the performance
improvements in the hando delay time and the packet loss rate.
References
19. C. Perkins. IP Mobility Support for IPv4. Internet Engineering Task Force (IETF ),
RFC-3344, 2002.
20. H. Soliman. Mobile IPv6 support for dual stack Hosts and Routers (DSMIPv6).
Internet Engineering Task Force (IETF ), draft-ietf-mip6-nemo-v4traversal-06 (work in
progress), May 2007.
21. J.-H. Yeh, J.-C. Chen, and P. Agrawal. Fast Intra-Network and Cross-Layer Handover
(FINCH) for WiMAX and Mobile Internet. IEEE Transactions on Mobile Computing,
8(4):558574, 2009.
Author Biographies
Yuh-Shyan Chen received the B.S. degree in Computer Science from Tamkang
University, Taiwan, R. O. C., in June 1988 and the M.S. and Ph.D. degrees in
Computer Science and Information Engineering from the National Central Uni-
versity, Taiwan, R. O. C., in June 1991 and January 1996, respectively. He joined
the faculty of Department of Computer Science and Information Engineering at
Chung-Hua University, Taiwan, R. O. C., as an associate professor in February
1996. He joined the Department of Statistic, National Taipei University in August
2000, and joined the Department of Computer Science and Information Engineer-
ing, National Chung Cheng University in August 2002. Since 2006, he has been a
Professor at the Department of Computer Science and Information Engineering,
National Taipei University, Taiwan. Prof. Chen served as Editor-in-Chief of Inter-
national Journal of Ad Hoc and Ubiquitous Computing (SCIE), Regional Editor
(Asia and Pacific) of IET Communications (SCI), Editorial Board of Telecom-
munication System Journal (SCIE), EURASIP Journal on Wireless Communica-
tions and Networking (SCIE), International Journal of Communication Systems
(SCIE), Mobile Information Systems (SCIE), and Journal of Internet Technol-
ogy (SCIE). He also served as Guest Editor of ACM/Springer Mobile Networks
and Applications (MONET), Wireless Communications and Mobile Computing,
The Computer Journal, and Wireless Personal Communications. His paper wins
the 2001 IEEE 15th ICOIN-15 Best Paper Award. Prof. Chen was a recipient
of the 2005 Young Scholar Research Award, National Chung Cheng University,
R.O.C.. His recent research topics include wireless communications, mobile com-
puting, and next-generation personal communication system. Dr. Chen is a senior
member of the IEEE Communication Society and Phi Tau Phi Society.
Yao-Tsu Lin received the B.S. degree in Department of Computer and Com-
munication Engineering from National Kaohsiung First University of Science and
Technology, Taiwan, ROC, in June 2006 and the M.S. degree in Graduate In-
stitute of Communication Engineering from National Taipei University, Taiwan,
ROC, in July 2008. His research interest includes secure issues for mobility man-
agement.