31 UDC 621.39 The Scheme of Vertical Handover Procedure with Care-of-Address Function Elvira R. Zaripova* , Alexander Yu. Grebeshkov† , Yurii N. Orlov *‡ , Vsevolod S. ShorginS * Department of Applied Probability and Informatics, Peoples’ Friendship University of Russia (RUDN University), 6 Miklukho-Maklaya st., Moscow, 117198, Russian Federation † Department of Automatic Telecommunication, Povolzhskiy State University of Telecommunications and Informatics, 23 Leo Tolstoy str., Samara, 443010, Russian Federation ‡ Department of Kinetic Equations, Keldysh Institute of Applied Mathematics of Russian Academy of Sciences, 4 Miusskaya Sq., Moscow, 125047, Russian Federation S Institute of Informatics Problems, Federal Research Center “Computer Science and Control” of Russian Academy of Sciences, 44-2 Vavilova st., Moscow, 119333, Russian Federation Email: zaripova_er@rudn.university, grebeshkov-ay@psuti.ru, yuno@kiam.ru, vshorgin@ipiran.ru We analyze the possibilities of using the cognitive radio standard IEEE 802.22. Temporarily unoccupied channels can be used for transferring information where 3GPP LTE service becomes impossible. The technology is very actual in sparsely populated areas. The current paper offers a complete vertical handover procedure from 3GPP LTE to the cognitive radio network IEEE 802.22 with the IP address preserved for easy user recognition. The procedure includes the authorization phase, registration, authentication and connection. The proposed procedure includes Care-of-Address Function for saving an IP address, which will be useful for mobile users. The main idea of proposed vertical handover procedure is saving of a temporary IP address. The vertical handover procedure based on entities from 3GPP LTE network and target IEEE 802.22 WRAN network. This procedure consist from 45 signaling messages (requests and responses) between mobile terminal, ANDSF function, Service Gateway and Packet Data Network Gateway, Base Station IEEE 802.22 and some other entities. Key words and phrases: cognitive radio, customer premise equipment, software-defined radio, IEEE 802.22, WRAN, Care-of-Address. Copyright © 2018 for the individual papers by the papers’ authors. Copying permitted for private and academic purposes. This volume is published and copyrighted by its editors. In: K. E. Samouylov, L. A. Sevastianov, D. S. Kulyabov (eds.): Selected Papers of the 1st Workshop (Summer Session) in the framework of the Conference “Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems”, Tampere, Finland, 20–23 August, 2018, published at http://ceur-ws.org 32 ITTMM-WSS—2018 1. Introduction The cognitive radio service allows using temporarily unoccupied channels, so called "white spots", in the range of TV frequencies from 410 MHz to 862 MHz [1, 2]. It is relevant for areas with low population density or in emergencies, when 3G/4G communication cannot be used. There are several radio standards use "white spots" technologies, primarily the IEEE 802.22 standard and the IEEE 802.11af standard. A comparison of these standards shows that IEEE 802.22 standard is more preferable for wireless regional access networks (WRAN). Also IEEE 802.22 standard is the first standard of cognitive radio, which has the status of international standard [3, 4]. We estimated channel access delay in cognitive radio network [5] and a vertical handover delay from Wi-Fi to 3GPP LTE [6]. We never used Care-of-Address (CoA) function with saving temporary IP-address for mobile users. This approach will include CoA function for mobile users vertical handover (VHO) delay. 2. Care-of-Address for mobile users in Inter System VHO TA model for VHO from 3GPP LTE to a cognitive network IEEE 802.22 with "white-spots for the Wireless Regional Access Network (WRAN) was developed in [7]. Such transition refers to inter system vertical handover and needs for a new IP-address in a target network. Current versions of an IP protocol for mobile users allow to link the "Home Address" and the address of user equipment in the target network. This temporary address is denoted as the address for the CoA transfer [8, 9]. This solution allows redirecting traffic from the user’s home network to the target network using CoA, including with inter-system VHO, which becomes essentially a "seamless handover". The corresponding possibilities are available in mobile versions of the IP protocol, MIPv6 and MIPv4 (Mobile IP version 6 and 4). In this case, inter-system VHO provides macro-mobility at the level of the IP protocol. Such capabilities are provided by the MIPv6 protocol, HMIPv6 (Hierarchical MIPv6 Management protocol), FMIPv6 (Fast Handover for MIPv6). To ensure CoA with inter-system VHO, it is most expedient to use MIPv6. The user device that uses MIPv6 receives information about the Home Agent, the home agent address, and the IPsec protocol parameters through the current service network. To ensure flexibility and prevent disruption of the session, the IKEv2 security protocol extension called MOBIKE (IKEv2 Mobility and Multihoming) protocol is used. Previously, we did not consider the vertical handover delay at the IP protocol level. For example, the RTT (Round Trip Time), jitter (jitter), and the packet loss ratio was used in [10]. For real-time services and a transfer rate of 3 Mbit/s the RTT is equal 59 ms for the Wi-Fi network and114 ms in the LTE network. In [11] the IP protocol was not considered, studies were conducted only for the physical and channel level. The horizontal handover delay from one to another cell in the IEEE 802.22 network is 150 -180 ms for the mobile users with speed 2 -10 mps for the Media Access Control level without the delay for registration and authentication. In [12] you can see a general scheme for delay formation for different versions of a MIP protocol, but there is no delay analysis for any stage of the horizontal handover. The propose [13] use unanchored IP address to support the streaming services and the corresponding IP session, and the main role belongs to the user equipment. In [14] economic aspects are considered for different market strategies for the wireless access networks development, but without the analysis of the access delay to fixed wireless networks through which off-load traffic is carried out. Thus, the problem of providing CoA function for mobile users is very important and actual, and there is no an analytical model for VHO delay estimating with CoA. Let the mobile terminal (User Equipment) support a physical connection and an IP session through the 3GPP LTE base station (eNodeB). We consider the case where the Zaripova Elvira R. et al. 33 mobile terminal uses the IP address received in 3GPP LTE when going to the target IEEE 802.22 network. The IEEE 802.22 and the ANDSF (Access network discovery service function) have the same functions within the overall model of the process of accessing heterogeneous cognitive network resources, these nodes are treated as a single functional entity, "ANDSF / Spectrum Manager", but each node processes alarm messages for different times. Given the coincidence of the functional assignment of the radio frequency spectrum manager IEEE 802.22 and Access network discovery service function (ANDSF ) within the general model of access to heterogeneous cognitive networks resources, these nodes are considered as a single functional entity, "ANDSF/Spectrum Manager", but each node processes signaling messages differently. 3. A VHO Procedure with saving an IP address The mobile terminal organizes an IP session through the current 3GPP LTE network through the eNodeB, S-GW (Service GateWay) and P-GW (Packet Data Network Gateway). The mobile terminal due to the deterioration of the QoS (Quality of Service) makes inter-system VHO to the target IEEE 802.22 WRAN network. In an IEEE 802.22 network, the mobile terminal (UE) is treated as a CPE (Customer Premises Equipment). The scheme of intersystem VHO to the target IEEE 802.22 network is presented in Figure 1. eNodeB CPE (UE) 3GPP LTE (current network) 3GPP LTE network Base station IEEE 802.22 WRAN (target network) AAA for IEEE TFTP S-GW 802.22 Server MME Transport network Time Server AAA/ HSS P-GW Manager ANDSF RFS Figure 1. Scheme of intersystem VHO in IEEE 802.22 network The first phase of vertical handover procedure is shown in Figure 2. The phase shows detecting the IEEE 802.22 network using ANDSF. As a result, the CPE (UE) receives information about the available target networks, including IEEE 802.22. Request (1) ClientHello is transmitted via IP protocol with the PSK keyset for mutual authentication of CPE and ANDSF and for the organization of the TLS tunnel. A response (2) is sent to the request indicating the safe transfer of the GBA. The request (3) indicates the selected method for loading network information using B-TID and provides a response (4) as the final message for exchanging public keys, after that a 34 ITTMM-WSS—2018 secure TLS connection is formed. Request (5) with data on technical capabilities and location of the terminal allows receiving a response (6) indicating the identifiers and radio access technologies (RAT) of the target network. CPE (UE) ANDSF (1) ClientHello message (3) ClientKeyExchange message IPSec tunnel (TLS) (5) Access NetworkInfo Request Figure 2. The authorization phase of CPE in inter-system VHO LTE - IEEE 802.22 WRAN The mobile terminal (CPE, UE) starts connecting and authenticating to the selected network IEEE 802.22 WRAN with saving the current IP address. Figure 3 shows the next phase of registration, authentication and connection to the target network IEEE 802.22 WRAN. The request (7) is about technical characteristics of CPE connecting to the base station 802.22 RNG-REQ (Ranging Request), an the response message (8) RNG-CMD message (Ranging Command) put, indicates the frequency bandwidth for further identifications. After that, the CPE transmits request for negotiation CBC (CPE Capability Request) property (9) of the IEEE 802.22 network and receives a CBC Response (CPE Capability Response) (10) with the values of the required parameters. For EAP authentication is generated an SCM (11) request, which generates the SCM request (12) to AAA, and then the SCM response (13) from AAA and SCM (14) from BS IEEE 802.22 for successful authentication. SCM Key Request (15) protect the streaming traffic and SCM Key-Reply (16) gives the required Key. REG request (17) and REG response (18) are responsible for a registration in the IEEE 802.22 WRAN network. After that the mobile terminal (CPE, UE) is connected to the IEEE 802.22 network at the physical and data link layer. We use Care-of-Address (CoA) function for saving IP address and CPE (UE) use mobile protocol MIPv6. The next phase of VHO scheme with CoA function is shown on Figure 4. CPE transmits IKE_SA_INIT request (19) over the IKEv2 protocol for initialization the Security Association (SA) and receives IKE_SA_INIT response (20) for the secure transfer of the IKE_AUTH request (21) when the CoA procedure begins. The ePDG node broadcasts the IKE_AUTH authorization request (22) and the HSS/AAA node transmits the EAP-Request/AKA challenge (23) for EAP authorization. The response (24) of the IKE_AUTH notifies the CPE of the initial authentication. IKE_AUTH request (25) confirm the authentication by the client and the request (26) redirects towards the HSS/AAA node. The response (27) confirms the final Authentication Answer, which is transmitted as a response (28) to the CPE. CPE Zaripova Elvira R. et al. 35 transmits a response message IRE_AUTH (29) about the successful procedure through the IKEv2 protocol. P-GW node via a response (30) IKE_AUTH sends to CPE configuration information and IP-address with CoA. The mobile terminal CPE receives information by IKE_AUTH response (31) and the temporary IP address with CoA function, which is the same as the IP address of the terminal on the 3GPP LTE network. The CPE software provides readiness for operation in the IEEE 802.22 network through the IPsec tunnel with CoA support. CPE sends a Binding Update request (32) for registration CoA address in 3GPP LTE network when using DSMIPv6. For supporting an IP address with CoA function an IP-CAN (IP-connectivity access network) Session Modification (33) is sent for all active sessions on the IEEE 802.22 network. The Acknowledge IP-CAN Session Modification response (34) confirms IP session modification, and Binding Acknowledgment response (35) updates the CoA binding for CPE. BS AAA for CPE (UE) IEEE 802.22 IEEE 802.22 (9) CBC Request (12) SCM Request (15) SCM Key Request Figure 3. Registration, authentication and connection to the target network IEEE 802.22 WRAN The request for IP address with CoA registration (36) is sent to the BS of IEEE 802.22, after which an IP session establishment with CoA through the IPsec tunnel is complete for the CPE. As a result, the data packets will be safely routed to the IP address previously assigned in the 3GPP LTE network. The last phase of VHO procedure refers to the target IEEE 802.22 network, see Figure 5. The request Time and Date (37) sets the exact current time and date to the CPE for service delivery events registration. The Current Time and Date response (38) confirms 36 ITTMM-WSS—2018 the current time and date on CPE. The Read request (39) sent a configuration file and informs about session initiation. CPE receives by the Data response (40) a configuration file for the streaming services organization. TFTP-CPLT (Config File TFTP Complete Message) request (41) notifies CPE and confirmation of the successful configuration upgrade is in TFTP response (42). Mobile terminal CPE is ready to session initiation in the IEEE 802.22 network, an IP address is already assigned. The Dynamic Service Addition (DSA) request (43) contains technical data, and DSA response (44) includes the dynamic addition of the streaming services, as confirmed by the DSA-ACK response (45). After this procedure the mobile terminal CPE can provide communication services including streaming services through the IEEE 802.22 network with an IP address from the 3GPP LTE network, which provides IP mobility and continuity of providing streaming services. BS CPE (UE) IEEE 802.22 3GPP ePDG 3GPP P-GW HSS/AAA (22) IKE_AUTH Request (23) EAP Request/ AKA challenge (24) IKE_AUTH Response (26) EAP Request/AKA challenge (27) Authentication Answer (29) IKE_AUTH Request (30)IKE_AUTH hPCRF Response IPSec/DSIMPv6 reconficuration (33) IP-CAN (32) Binding Update Request Session Modification Request (34)Acknowledge IP-CAN Session Modification Response (35) Binding Acknowledgement Response IP session with CoA Figure 4. CoA in inter-system VHO in IEEE 802.22 WRAN network Zaripova Elvira R. et al. 37 BS Time TFTP CPE (UE) IEEE 802.22 Server Server (41) TFTP-CPLT Request (42) TFTP Response Dynamic addition for a streaming service Figure 5. Streaming traffic transmission with CoA to IEEE 802.22 WRAN network 4. Conclusions As further research we plan to analyze such parameters as mean value or quantile of VHO delay could be found using the data from papaers [4, 15–17]. We will apply the approaches [18, 19] for analysis of new procedure with Care-of-Address function. The proposed procedure starts from LTE, and LTE networks are the 5th generation networks with variety of technologies including radio technologies for wireless communication [20– 22]. For such networks, new quality indicators, such as interference [23, 24] affecting signal power and spectral efficiency, as well as traditional indicators, i.e. delays, are analyzed. Sometimes, to optimize the functioning of the system, it is necessary to use special control mechanisms, for example, hysteresis control [25–28]. Another direction of our reserch is using the approaches from cluster method [29] or multidimensional information systems [30]. Acknowledgments The publication has been prepared with the support of the “RUDN University Program 5-100” and funded by RFBR according to the research project No 17-07-00845. References 1. White Space Communication. Advances, Developments and Engineering Challenges, Ed. by Mishra, A.K., Johnson, D. L. Springer International Publishing (2015). 2. S. W. Oh, Y. Ma , M.-H. Tao, E. Peh, TW White Space. The First Step Towards Better Utiliza-tion of Frequency Spectrum. IEEE Press, Wiley, NJ, USA (2016) 3. D. Lekomtcev, R. Maršálek, Comparison of 802.11af and 802.22 standards – Physical Layer and Cognitive Functionality. Electrorevue. 3 (2) (2012) 12–18. 38 ITTMM-WSS—2018 4. IEEE std. 802.22-2011. Telecommunications and information exchange between systems Wireless Regional Area Networks (WRAN) – Specific requirements. Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands, IEEE Computer Society, (2011). 5. A.Yu. Grebeshkov, A. V. Zuev, D. S. Kiporov, Computer Simulation of Average Channel Access Delay in Cognitive Radio Network. DCCN-2016 (Distributed com- puter and communication networks: control, computation, communications), CCIS 678 Springer International Publishing AG (2016) pp. 325–336. 6. A. Grebeshkov, E. Zaripova, A. Roslyakov, K. Samouylov, Modelling of Vertical Handover from Untrusted WLAN Network to LTE, ECMS 2017 (31st European Conference on Modelling and Simulation), Budapest, Hungary, pp. 694–700. 7. A. Grebeshkov, Yu. Gaidamaka, O. Vikhrova, E. Zaripova, Analysis of Vertical Handover Time in Heterogeneous Wireless Networks. Informatics and Applications, 11 (4) (2017) 70–78, doi:10.14357/19922264170409. 8. M. Nakhjiri, M. Nakhjiri, AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI, and IP Mobility. John Wiley & Sons Ltd., 2005. 9. Wireless and Mobile Network Security, Ed. by H. Chaouchi, M. Laurent-Maknavicius, ISTE Ltd., Wiley, (2009). 10. Y. Ohishi, K. Maeda, T. Sahara, N. Hayashi, R. Aibara, Consideration of Net- work Selection Criteria on IP Mobility Communications Quality by Real-Time Status and/or Statistical Information, COMPSACW (IEEE 37th Annual Computer Software and Applications Conference Workshops), Kyoto, Japan, pp. 569–574. 11. J. Lee, S. Lee, C.S. Hong, T. Z. Oo and H. Jung, Design of Handover Scheme for IEEE 802.22 WRAN, ICUIMC 2012 (6th International Conference on Ubiquitous Information Management and Communication), Kuala Lumpur, Malaysia pp. 1–9. 12. C. Cho, J.-D. Cho, J. Jeong, Analytical Modeling of IP-based Hierarchical Mobility Management Protocols, IMIS 2014 (8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing), Birmingham, UK (2014) pp. 166–171. 13. J. Huang, F. Fang, C.-C. Xing, Y. Qian, Terminal-Centric Distribution and Orches- tration of IP Mobility for 5G Networks, IEEE Communications Magazine, 52 (11) (2014) 86–92. 14. A. Yegin, J. Park, K. Kweon, J. Lee, IP Flow Mobility in the Industry: From An Economic Perspective, IEEE Access, 5 (2017) 3055–3068. 15. N. Nikaein, S. Krco, Latency for Real-Time Machine-to-Machine Communication in LTE-Based System Architecture, 17th European Wireless Conferense, Sustainable Wireless Technologies, Vienna, Austria (2011) pp. 1–6. 16. D. Granlund, P. Holmlund, C. Åhlund, Opportunistic Mobility Support for Resource Constrained Sensor Devices in Smart Cities, Sensors, 15, (2015) 5112–5135. 17. TV White Space Spectrum Technologies. RegulationsAdvances, Developments and Engineering Challenge, (2013) pp 1–180. 18. E. Zaripova, A. Grebeshkov, N. Ivanova and K. Samouylov, Modeling of Vertical Handover from LTE to a Cognitive Network, ICNAAM 2018 – International Confer- ence of Numerical Analysis and Applied Mathematics, AIP Conference Proceedings (2018), Accepted. 19. A. Grebeshkov, Yu. Gaidamaka, E. Zaripova, A. Pshenichnikov, Modeling of Ver- tical Handover from 3GPP LTE to Cognitive Wireless Regional Area Network. 9th international congress on ultra modern telecommunications and control sys- tems(ICUMT), Germany, Munich, IEEE Communications Society, (2017) pp. 1–6, doi:10.1109/ICUMT.2017.8255184. 20. V. Vishnevsky, A. Krishnamoorthy, D. Kozyrev, A. Larionov. Review of Methodology and Design of Broadband Wireless Networks with Linear Topology / Indian Journal of Pure and Applied Mathematics, June (2016), 47 (2) 329–342, doi:10.1007/ s13226-016-0190-7. Zaripova Elvira R. et al. 39 21. A. Ometov, D. Kozyrev, V. Rykov, S. Andreev, Y. Gaidamaka, Y. Koucheryavy. Reliability-Centric Analysis of Offloaded Computation in Cooperative Wearable Applications, Wireless Communications and Mobile Computing, 2017 Article ID 9625687, (2017), 1–15, doi:10.1155/2017/9625687. 22. D. A. Aminev, A. P. Zhurkov, S. N. Polesskiy, V. V. Kulygin, D. V. Kozyrev. Comparative Analysis of Reliability Prediction Models for a Distributed Radio Direction Finding Telecommunication System, Communications in Computer and Information Science (CCIS), Springer International Publishing, 678 (2016) 194–209, doi:10.1007/978-3-319-51917-3_18. 23. V. Begishev, R. Kovalchukov, A. Samuylov, A. Ometov, D. Moltchanov, Y. Gaidamaka, S. Andreev, An analytical approach to SINR estimation in adjacent rectangular cells, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9247, (2015) 446–458. 24. A. Samuylov, D. Moltchanov, Y. Gaidamaka, S. Andreev, Y. Koucheryavy, Random Triangle: A Baseline Model for Interference Analysis in Heterogeneous Networks, IEEE Transactions on Vehicular Technology, 65 (8), art. no. 7275184, (2016) 6778– 6782. 25. K. Samouylov, P. Abaev, Y. Gaidamaka, A. Pechinkin, R. Razumchik, Analytical modelling and simulation for performance evaluation of sip server with hysteretic overload control, Proceedings - 28th European Conference on Modelling and Simu- lation, ECMS 2014, (2014) pp. 603–609. 26. Y. Gaidamaka, A. Pechinkin, R. Razumchik, K. Samouylov, E. Sopin, Analysis of an 𝑀 |𝐺|1|𝑅 queue with batch arrivals and two hysteretic overload control policies, International Journal of Applied Mathematics and Computer Science, 24 (3) (2014) 519-534. 27. B. G. Ibrahimov, Sh. M. Mammadov, The study and estimation of the performance attributes of terminal hardware for a link in a multiservice communication network, Automatic Control and Computer Sciences, 44 (6) (2010) 359–363. 28. B. Ibrahimov, S. Ismaylova, Research Efficiency of Integrated Communication Networks with User of Signaling System, 4th International Conference “Problems of Cybernetics and Informatics”, PCI Proceedings (2012). 29. M. Fomin, The Application of Classification Schemes while Describing Meta- data of the Multidimensional Information System based on the Cluster Method, Communications in Computer and Information Science, 700 (2017) 307–318, doi:10.1007/978-3-319-66836-9_26. 30. M. B. Fomin, The Description of Metadata of the Multidimensional Information Systems using Test Data. CEUR Workshop Proceedings, 1995 (2017) 28–34.