1. Introduction
Rapid advancements in communication technologies are creating opportunities for various application domains due to their potential for handling massive internet traffic, richer mobility, better security, and seamless mobility [
1,
2]. Such potential of these technologies supports the integration of next-generation 6G-enabled IoT mobility [
2,
3,
4,
5]. As a result, various domains are motivated to embrace modern communication technologies by integrating modern mobility protocols in large-scale IoT [
2,
6]. Examples in such domains include information access using smart devices, processing of transactions, support for modern technologies, and mobility services. Integration of such solutions in modern mobility solutions requires optimized AI-based models, adaptive decision-based algorithms, and secure communication [
7].
An effective modern solution requires the integration of 6G-enabled IoT mobility management protocol such as PMIPv6 [
8] in a modern IoT environment [
9,
10]. PMIPv6 performs its mobility using Mobile Access Gateway (MAG) and Local Mobility Anchor (LMA) [
11]. However, various problems are associated with basic PMIPv6 such as the handover delay during the handover, packet loss due to the absence of buffering mechanism, support for network mobility, additional signaling, and load on certain entities due to its involvement in overall mobility [
11,
12].
Furthermore, among the solutions provided for solving the aforementioned issues, predictive PMIPv6 extension protocols received much attention from experts [
13,
14]. One of the major reasons for its adoption is the prediction of handover occurrence in advance and making necessary arrangements before such an event [
1]. Such extensions may use the Mobile Node (MN), LMA, or MAG for performing such prediction [
11,
12]. In the context of PMIPv6 protocol, MN is a device that moves among networks in addition to maintaining its IP address. To predict the handover moment in advance, various solutions use Received Signal Strength (RSS) [
15,
16].
In the following method, the RSS is used to predict the handover moment. After the timer has been set, RSS is continuously checked, and a condition is set to activate the event when RSS matches a certain threshold value. If the condition is met, it is presumed that MN is about to roam to another MAG’s domain, and the relevant handover arrangements are undertaken to minimize changeover latency [
16]. However, one of the major problems with such RSS-based schemes is that RSS is prone to environmental conditions and may affect the RSS measure. In such a case, the scheme may initiate the handover process even when the MN is not properly located for handover [
15]. Therefore, the overall performance of the RSS-based schemes is dependent on the accuracy of the RSS measure. If the measure is accurate, these schemes will provide optimal performance. On the other hand, errors in RSS measures may lead to decreased performance of the scheme. Such an issue may lead to longer handover latency, addition signaling, and unnecessary buffering [
15,
16,
17]. For solving such issues, experts use the location of the resources to enhance the decision regarding the prediction of the handover moment in addition to the identification of target MAG [
18,
19,
20]. Location is integrated with other measures for improving handover prediction [
21].
For supporting mobility management and enhancing the communication services in 6G-enabled IoT, the proposed scheme combines the location parameters of resources with RSS measures in an intelligent manner to improve handover moment prediction, and resource efficiency by avoiding additional signaling. Furthermore, the network resources’ information is utilized more effectively for buffering efficiency too. For measuring the efficiency of different aspects, equations are derived in the context of existing schemes. The proposed scheme is compared with available schemes using the proposed equations. The overall analysis and comparisons show that the present solution is more resource efficient, resource-friendly, reliable, and accurate in predicting the handover moment. The research contributions of this study are the following:
To provide a location-based extension for efficient utilization of resources in the IoT environment to accurately predict handover moment.
To provide an efficient buffering mechanism for storage efficiency in the IoT domain to handle packet-loss problems.
To achieve better signaling efficiency in the IoT environment by effectively using nMAG-ID.
To achieve efficient handover latency for the handover process during the mobility of resources in the IoT domain.
The rest of the article is organized into the following sections.
Section 2 provides details regarding the studies related to the presented problem. The proposed work, its mechanism, and its procedure are provided in
Section 3. The setup for implementation and validating our extension is given in
Section 4. Obtained results of the comparisons are presented in
Section 5. Finally, the conclusion and future work are discussed in
Section 6.
2. Related Work
Modern IoT such as 6G-enabled IoT are supported by efficient network-based mobility management protocols for resource efficiency [
1,
13,
22,
23]. For adopting IoT in a modern solution, a number of associated IoT challenges, its feasibility, security issues, and architectures are analyzed for assessing the potential adaptation of IoT [
24]. Experts suggest devising scalable, resource-efficient, feature-richer, and reliable solutions for improving the services’ quality in the upcoming 5G/6G communication. Furthermore, for supporting IoT, a network-based mobility protocol is devised in which the point of attachment by their respective devices is updated frequently and provides better signaling efficiency during mobility [
25]. For supporting the potential domains, Ref. [
25] highlights a number of functional requirements and also provided various mobility management solutions that are made on the various requirement and the modern standards of 5G/6G. To meet such functional requirements, proxy mobile IPv6 protocol extensions are one of the most feasible candidates for enhanced mobility in the IoT [
26,
27,
28].
Network-based mobility solutions such as PMIPv6 extension protocols have received much attention by avoiding the involvement of the MNs in their processes [
16]. In addition, domain experts have put much effort to address and solve the aforementioned problems associated with PMIPv6 protocols [
13]. As a result, a number of fast proxy mobile IPv6 extensions were proposed that minimize handover latency as low as possible [
29]. The packet-loss problem is coped with the addition of a buffering mechanism to store the packets during the handover procedure. Overall signaling of the schemes is improved by eliminating the prediction of the expected resources to which the MN could roam [
11]. Among the predictive schemes, there are many schemes that use the Received Signal strength (RSS) for predicting the initiating moment for handover. This scheme includes a smart buffering scheme [
17], location-aware FPMIPv6, a low latency scheme [
16], and FPMIPv6 [
15].
An attempt made for handover efficiency and addressing the loss of packets during handover, FPMIPv6 works by predicting the next MAG (nMAG) in advance for the MN to move [
15]. In this scheme, the MN identifies the target MAG when the value of RSS becomes too low. After predicting the nMAG, MN contacts the pMAG via the L2 report. Using the L2 report or L2 trigger, the MN informs the network about changing its location in the network. After receiving the information from MN, the message including handover initiation (HI) is sent from pMAG to nMAG while nMAG replies to the HI message with a Handover acknowledgment (HAck) message. For exchanging the buffered packets, a tunnel is formed between pMAG and nMAG. Furthermore, the attachment of MN is detected by nMAG and necessary signaling is performed for communicating Proxy Binding Update (PBA) and Proxy Binding Acknowledgement (PBA) between LMA and nMAG. Finally, the buffered packets and Router Advertisement (RA) are sent to the MN.
For enhancing the handover latency, the process of authentication is optimized in an RSS-based PMIPv6 protocol [
16] referred to as a low latency scheme. In such a scheme, based upon the occurrence of an RSS event, De-Reg Proxy Binding Update (De-Reg PBU) is sent to LMA from pMAG. LMA immediately starts storing packets and using the Immediate Handover Request (IHR) message, it contacts its surrounding MAGs. Upon the attachment of MN, the corresponding MAG reply to the IHR message based on MN’s information. LMA responds to the pMAG with De-Reg Proxy Binding Acknowledgment (De-Reg PBA). LMA then forwards any stored packets to nMAG to MN.
Another approach that directly addresses the packet-loss issue is the smart buffering scheme, which solves the problem by buffering packets during MN changeover. The smart buffering system operates by monitoring the RSS value and storing packets destined for MN when the value falls below a certain threshold [
17]. MN handover process works by using Flush Request (FReq) and Flush Reply (FRep) messages. FReq message is communicated to the neighboring MAGs of nMAG when MN attachment is detected by target MAG. Using information of MN in the FReq message, the corresponding pMAG reply by using the FRep message. Furthermore, for solving packet loss, the buffered packets are transferred from pMAG to nMAG using the established tunnel.
A more efficient location-based PMIPv6 extension is devised that effectively uses the location information for enhancing the signaling efficiency, and load on network entities [
1,
13]. In such a scheme, the location of the MAG is shared with its corresponding MNs so that MN should only request for handover when its location is proper. Such a procedure eliminates unnecessary signaling and load on network resources.
For providing better mobility solutions based on the requirement of current as well as future communication, a resource-friendly and performance-efficient mobility solution is provided that can handle many devices in a massive IoT environment.
3. Proposed Scheme
Upcoming generation communications demand much higher mobility requirements along with efficiency in resource utilization in a massive IoT environment [
30,
31]. To achieve the mobility requirements in IoT, the main purpose of the presented research is to provide a resource-efficient location-based PMIPv6 extension protocol for enhanced mobility in 6G-enabled IoT. The main contributing aspects of the proposed extension include integrating RSS and the location of network entities for accurate prediction of handover initiation, optimizing the signaling efficiency, reducing handover latency, and enhancing buffering efficiency in addition to the existing RSS-based PMIPv6 protocol extensions. For signaling efficiency, RSS is integrated with location information in an effective way for avoiding unnecessary communication of networking entities. Buffering efficiency is achieved using the LMA and nMAG in an optimized way for storing the packets. Handover latency is optimized by reducing by involving MN, LMA, and nMAG-ID in the handover process. To understand the basic working of the presented protocol extension, the following are the details of the same.
3.1. Proposed PMIPv6 Protocol Extension
The proposed protocol extension is based on the foundation of RSS, location information, and profile information of the target MAG identifier. The existing RSS-based PMIPv6 protocol extensions suffer from false handover initiation, longer handover latency, additional buffering, and high signaling due to RSS errors. Furthermore, existing location-based PMIPv6 protocol extensions may enhance some of the issues; however, to provide an overall efficient protocol, extensions are required. The proposed extension improves the efficiency of RSS-based PMIPv6 extension protocols. The working of the proposed solution is the following.
To efficiently use the location information with RSS measure, the MAG will also communicate information regarding its location to the MNs attached to it. For this purpose, MAG is considered as static MAG and each MAG knows its coverage. Furthermore, MAG can communicate with its surrounding MAG and know their locations too. Therefore, after sharing its information with their corresponding MNs, MN will be able to find its distance from their MAG. Such knowledge will help the MN avoid false handover requests when RSS falls below the threshold. MN in this solution will monitor RSS in addition to the location of MAG.
The handover process is improved by monitoring not only RSS but also the effective usage of MAG’s location of resources involved in mobility. It is important to mention that the MAG location will only be exploited when an RSS error occurs. Such a procedure will ensure that if the RSS measure is normal, then the MN will roam without any service disruption. However, if an RSS event or RSS error occurs, the MN will check the location of MAG to decide whether the request for handover is to be made or not. In case of an RSS error, the location will not be appropriate, and MN will not request for handover initiation. Such decision-making will also eliminate false handover initiation problems. Furthermore, MN will only request for handover whenever handover is mandatory.
For simplifying the handover process and to optimize the signaling efficiency by avoiding unnecessary communication among network resources, the MN will communicate information associated with its location using an L2 report when an RSS event occurs. It is important to mention that an RSS event is when the MN is properly located for handover, and an RSS error is when RSS becomes too low due to surroundings.
After receiving the location information of MN, then pMAG will identify the target or next MAG that is expected to be the next MAG for MN. pMAG will send a De-Reg PBU message along with nMAG-ID to LMA. Upon receiving De-Reg PBU, LMA will start buffering packets and will keep sending the packets to pMAG. At the same time, LMA also sends an IHR message to the nMAG using the nMAG-ID. In a low latency scheme, LMA multicast the IHR message to surrounding MAGs. However, in the proposed location-based protocol extension, the LMA only sends the IHR message to the corresponding nMAG instead of surrounding MAGs. Such enhancement significantly reduces the signaling required. For forwarding the buffered packets, a tunnel is established between LMA and nMAG.
When MN is detached from pMAG, then the LMA forward all the buffered packets to nMAG and, at the same time, LMA sends a De-Reg PBA message to pMAG. When the MN attachment is detected by nMAG, then it immediately provides services to the MN by sending the buffered packets received from the LMA. In the meantime, nMAG communicates with LMA via PBU message in order to inform the LMA regarding MN’s arrival while LMA replies with a PBA message. Upon receiving the PBA message, nMAG communicates with MN by forwarding the Router Advertisement (RA). LMA forwards the packets destined for MN towards nMAG that are further provided to MN via nMAG in a regular fashion.
The proposed solution will always ensure that MN will only request when a handover is necessary. In the case of existing RSS-based extensions, RSS errors had a major effect on performance efficiency. Additional signaling and unnecessary information communication during RSS errors are avoided in the proposed solution. Furthermore, information communication regarding target MAG-ID provides an accurate measure for LMA to know in advance the MN’s expected MAG. In addition, such information also helps LMA to effectively manage the load on entities. However, such a problem is not in the scope of this paper. Target MAG-ID avoids the multi-casting of IHR messages to the surrounding MAGs of LMA. The overall working flow of messages and entities involved in the proposed protocol extension is shown in
Figure 1.
Author Contributions
Conceptualization, H.U.K.; Data curation, F.A. and M.Z.K.; Formal analysis, S.N. and I.U.; Funding acquisition, I.U.; Investigation, S.N.; Methodology, H.U.K.; Project administration, I.U.; Resources, F.A.; Software, H.U.K.; Supervision, S.N. and I.U.; Validation, A.H. and M.Z.K.; Visualization, M.Z.K.; Writing—original draft, H.U.K. and A.H.; Writing—review and editing, A.H. and F.A. All authors have read and agreed to the published version of the manuscript.
Funding
This work received no external funding.
Data Availability Statement
Data will be provided on request.
Conflicts of Interest
The authors declare that there are no conflict of interest.
References
- Hussain, A.; Nazir, S.; Khan, F.; Nkenyereye, L.; Ullah, A.; Khan, S.; Verma, S. A Resource Efficient hybrid Proxy Mobile IPv6 extension for Next Generation IoT Networks. IEEE Internet Things J. 2021, 10, 2095–2103. [Google Scholar] [CrossRef]
- Wang, Q.; Zhu, X.; Ni, Y.; Gu, L.; Zhu, H. Blockchain for the IoT and industrial IoT: A review. Internet Things 2020, 10, 100081. [Google Scholar] [CrossRef]
- Salahdine, F.; Han, T.; Zhang, N.J.S. Security in 5G and beyond recent advances and future challenges. Secur. Priv. 2023, 6, e271. [Google Scholar] [CrossRef]
- Varga, P.; Peto, J.; Franko, A.; Balla, D.; Haja, D.; Janky, F.; Soos, G.; Ficzere, D.; Maliosz, M.; Toka, L. 5G support for Industrial IoT Applications—Challenges, Solutions, and Research gaps. Sensors 2020, 20, 828. [Google Scholar] [CrossRef] [PubMed]
- Lee, D.; Yim, K.; Lee, H. Proxy Based Resource Management Scheme in IoT Environment. In Proceedings of the 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), Krakow, Poland, 4–6 November 2015; pp. 544–546. [Google Scholar]
- Mazhar, T.; Talpur, D.B.; Shloul, T.A.; Ghadi, Y.Y.; Haq, I.; Ullah, I.; Ouahada, K.; Hamam, H.J.B.S. Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence. Brain Sci. 2023, 13, 683. [Google Scholar] [CrossRef]
- Mazhar, T.; Irfan, H.M.; Haq, I.; Ullah, I.; Ashraf, M.; Shloul, T.A.; Ghadi, Y.Y.; Imran; Elkamchouchi, D.H.J.E. Analysis of Challenges and Solutions of IoT in Smart Grids Using AI and Machine Learning Techniques: A Review. Electronics 2023, 12, 242. [Google Scholar] [CrossRef]
- Gohar, M.; Anwar, S.; Ali, M.; Choi, J.-G.; Alquhayz, H.; Koh, S.-J. Partial Bicasting with Buffering for Proxy Mobile IPV6 Mobility Management in CoAP-Based IoT Networks. Electronics 2020, 9, 598. [Google Scholar] [CrossRef] [Green Version]
- SAJWAN, M.P. Technique to Improve Efficiency of Energy For Data Aggregation Using Internet of Things. 2023. Available online: https://shodhgangotri.inflibnet.ac.in/bitstream/20.500.14146/13316/1/manisha_phd%20synopsys.pdf (accessed on 1 August 2023).
- Khan, H.U.; Sohail, M.; Ali, F.; Nazir, S.; Ghadi, Y.Y.; Ullah, I.J.P.C. Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices. Phys. Commun. 2023, 59, 102084. [Google Scholar] [CrossRef]
- Jabir, A.J.; Shamala, S.; Zuriati, Z.; Hamid, N.J.I.S.J. A comprehensive survey of the current trends and extensions for the proxy mobile IPv6 protocol. IEEE Syst. J. 2015, 12, 1065–1081. [Google Scholar] [CrossRef] [Green Version]
- Modares, H.; Moravejosharieh, A.; Lloret, J.; Salleh, R.B.J.I.S.J. A Survey on Proxy Mobile IPv6 Handover. IEEE Syst. J. 2016, 10, 208–217. [Google Scholar] [CrossRef]
- Hussain, A.; Nazir, S.; Khan, S.; Ullah, A. Analysis of PMIPv6 extensions for identifying and assessing the efforts made for solving the issues in the PMIPv6 domain: A systematic review. Comput. Netw. 2020, 179, 107366. [Google Scholar] [CrossRef]
- MM, N. ATTESTED PMIPV6 PROTOCOL FOR SEAMLESS HANDOVER IN 5G/LTE/Wi-Fi DEPLOYMENTS. 2022. Available online: https://www.tdcommons.org/dpubs_series/4987/ (accessed on 1 August 2023).
- Yokota, H.; Chowdhury, K.; Koodli, R.; Patil, B.; Xia, F. Fast handovers for proxy mobile IPv6. In RFC 5949; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2010. [Google Scholar]
- Oh, S.; Choo, H. Low Latency Handover Scheme Based on Optical Buffering at LMA in Proxy MIPv6 Networks; Springer: Berlin, Heidelberg, 2009; pp. 479–490. [Google Scholar]
- Choi, H.-Y.; Kim, K.-R.; Lee, H.-B.; Min, S.-G.; Han, Y.-H. Smart buffering for seamless handover in proxy mobile IPv6. Wirel. Commun. Mob. Comput. 2011, 11, 491–499. [Google Scholar] [CrossRef]
- Aldabbas, H. LPBR: Location Prediction Based Routing Protocol for Mobile IoT Systems. In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, 26–27 June 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 1–5. [Google Scholar]
- Wang, X.; Le, D.; Yao, Y.; Xie, C. Location-based mobility support for 6LoWPAN wireless sensor networks. J. Netw. Comput. Appl. 2015, 49, 68–77. [Google Scholar] [CrossRef]
- Park, C.; Choo, H.; Choe, H.J. Location-aware fast handover in proxy mobile IPv6. In Proceedings of the 2013 IEEE 78th Vehicular Technology Conference (VTC Fall), Las Vegas, NV, USA, 2–5 September 2013; pp. 1–5. [Google Scholar]
- Kang, B.; Park, C.; Choo, H. A location aware fast PMIPv6 for low latency wireless sensor networks. IEEE Sens. J. 2019, 19, 9456–9467. [Google Scholar] [CrossRef]
- Gupta, D.; Juneja, S.; Nauman, A.; Hamid, Y.; Ullah, I.; Kim, T.; Tag eldin, E.M.; Ghamry, N.A.J.E. Energy Saving Implementation in Hydraulic Press Using Industrial Internet of Things (IIoT). Electronics 2022, 11, 4061. [Google Scholar]
- Ullah, I.; Qian, S.; Deng, Z.; Lee, J.-H.J.D.C. Extended Kalman filter-based localization algorithm by edge computing in wireless sensor networks. Digit. Commun. Networks 2021, 7, 187–195. [Google Scholar] [CrossRef]
- Aman, A.H.M.; Yadegaridehkordi, E.; Attarbashi, Z.S.; Hassan, R.; Park, Y.-J. A Survey on Trend and Classification of Internet of Things Reviews. IEEE Access 2020, 8, 111763–111782. [Google Scholar] [CrossRef]
- Gui, G.; Liu, M.; Tang, F.; Kato, N.; Adachi, F.J.I.W.C. 6G: Opening new horizons for integration of comfort, security, and intelligence. IEEE Wirel. Commun. 2020, 27, 126–132. [Google Scholar] [CrossRef]
- Guan, J.; Sharma, V.; You, I.; Atiquzzaman, M.; Imran, M. Extension of MIH for FPMIPv6 (EMIH-FPMIPv6) to support optimized heterogeneous handover. Future Gener. Comput. Syst. 2019, 97, 775–791. [Google Scholar] [CrossRef]
- Berguiga, A.; Harchay, A.; Kassab, M.; Youssef, H. FPMIPv6-S: An Enhanced Mobility Protocol for 6LoWPAN-Based Wireless Mobile Sensor Networks; Springer International Publishing: Cham, Germany, 2018; pp. 252–263. [Google Scholar]
- Berguiga, A.; Youssef, H. FPMIPv6-S: A New Mobility Management Protocol for Wireless Sensor Networks. Proceedings of 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia, 30 October–3 November 2017; pp. 1109–1116. [Google Scholar]
- Zhang, L.; Tian, Y.-C.J.W.N. An enhanced fast handover triggering mechanism for Fast Proxy Mobile IPv6. Wirel. Networks 2018, 24, 513–522. [Google Scholar] [CrossRef] [Green Version]
- Khan, W.U.; Imtiaz, N.; Ullah, I.J.I.T.L. Joint optimization of NOMA-enabled backscatter communications for beyond 5G IoT networks. Internet Technol. Lett. 2021, 4, e265. [Google Scholar] [CrossRef]
- Asif, M.; Khan, W.U.; Afzal, H.R.; Nebhen, J.; Ullah, I.; Rehman, A.U.; Kaabar, M.K.J.W.C.; Computing, M. Reduced-complexity LDPC decoding for next-generation IoT networks. Wirel. Commun. Mob. Comput. 2021, 2021, 2029560. [Google Scholar] [CrossRef]
| Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).