DOI QR코드

DOI QR Code

Performance Evaluation of MACSec for Host Mobility

MACSec의 단말 이동성 성능평가

  • Ahn, Sangjun (Department of Convergence Security, Graduate School of Chung-Ang University) ;
  • Shin, Dongcheon (Department of Industrial Security, Chung-Ang University)
  • Received : 2019.01.11
  • Accepted : 2019.04.18
  • Published : 2019.05.31

Abstract

It is essential to consider the relationships between each component in the communication infrastructure in order to build and optimize the infrastructure. In this paper, based on the major factors to consider for the optimized communication infrastructure, we propose an enhanced MACSec-based deployment mechanism for communication infrastructure. The proposed MACSec mechanism can replace the IPSec without the additional devices and redesign of the communication infrastructure. In addition, we evaluate the performance of MACSec and IPSec in terms of the major factors such as message overhead, encryption processing, and host mobility. According to the evaluation results, we can say that MACSec is superior to IPSec with regard to mobility as well as hop delay and message overhead.

통신 인프라 구축과 최적화를 위해서는 각 구성 요소들의 연관성을 고려할 필요가 있다. 본 논문에서는 최적화된 통신 인프라 구축을 위해 필요한 주요 고려사항을 바탕으로 성능이 향상된 MACSec 기반의 통신 인프라 구성 방안을 제시한다. 제안된 MACSec 기반 기술은 통신 인프라를 처음부터 다시 설계하지 않고 IPSec 기술을 별도의 장비를 추가하지 않고 대체할 수 있다. 아울러, 구성 시 주요 고려사항인 메시지 오버헤드와 암호화 처리 성능, 그리고 이동성 측면에서 실험을 통해 IPSec과 성능을 평가한다. 시험 결과에 따르면 MACSec으로 구현된 암호화 네트워크에서 IPSec보다 Hop 지연과 메시지 오버헤드와 같은 일반적 성능뿐만 아니라 연결 지점 변경 시험을 통해 이동성 성능이 우위에 있다.

Keywords

References

  1. Altunbasak, H., Krasser, S., Owen, H. L., Grimminger, J., Huth, H. P., and Sokol, J., "Securing Layer 2 in Local Area Networks," Networking-ICN, pp. 699-706, 2005.
  2. Barceló, F., Paradells, J., Setaki, F., and Gibeaux, M., "Design and Modeling of Internode: A Mobile Provider Provisioned VPN," Mobile Networks and Applications, Vol. 8, No. 1, pp. 51-60, 2003. https://doi.org/10.1023/A:1021119711364
  3. Beauchamps, M., Hoitjink, M., and Leese, M., "Introduction: Security/Mobility and the Politics of Movement," Manchester University Press, pp. 1-13, 2017.
  4. Choi, W. G. and Lee, Y. J., "Factors Influencing the Introduction of Mobile Security Technology," The Journal of Society for e-Business Studies, Vol. 18, No. 4, pp. 215-240, 2013. https://doi.org/10.7838/jsebs.2013.18.4.215
  5. Croitoru, A., Niculescu, D., and Raiciu, C., "Towards WiFi Mobility without Fast Handover," Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, pp. 219-234, 2015.
  6. Dutta, A. and Shulzrinne, H., "Mobility Protocols and Handover Optimization," John Wiley & Sons, Ltd-IEEE Press, 2014.
  7. Gu, R., Zhang, X., Yu, L., and Zhang, J., "Enhancing Security and Scalability in Software Defined LTE Core Networks," 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering(TrustCom/BigDataSE), IEEE, 2018.
  8. IEEE Std. 802.1AE, "Media Access Control (MAC) Security," 2006.
  9. Jaggi, C., "Ethernet Encryptors for Metro and Carrier Ethernet," http://www.uebermeister.com/publications.html, 2017.
  10. John, W., Pentikousis, K., Agapiou, G., Jacob, E., Kind, M., Manzalini, A., Risso, F., Staessens, D., Steinert, R., and Meirosu, C., "Research Directions in Network Service Chaining," SDN4FNS 2013 Workshop on Software Defined Networks for Future Networks and Services, IEEE SDN, pp. 1-7, 2013.
  11. Lee, S. and Jahng, J., "The Diffusion of Internet of Things: Forecasting Technologies and Company Strategies using Qualitative and Quantitative Approach," The Journal of Society for e-Business Studies, Vol. 20, No. 4, pp. 19-39, 2015. https://doi.org/10.7838/jsebs.2015.20.4.019
  12. McCann, P., "Mobile IPv6 Fast Handovers for 802.11 Networks," IETF RFC 4260, November 2005.
  13. Quinn, P. and Nadeau, T., "Problem Statement for Service Function Chaining," IETF RFC 7498, April 2015.
  14. Shin, H., Song, Y. U., Sung, N. H., "The Impact of Perception on the Difference Between Mobile and Stationary Internet Toward the Intention to Use Mobile Internet," The Journal of Society for e-Business Studies, Vol. 15, No. 3, pp. 99-129, 2010.