skip to main content
10.1145/1366919acmconferencesBook PagePublication PagesmobicomConference Proceedingsconference-collections
MobiArch '07: Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture
ACM2007 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MobiArch07: Second International Workshop on Mobility in the Evolving Internet Architecture Kyoto Japan August 27 - 30, 2007
ISBN:
978-1-59593-784-1
Published:
27 August 2007
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 03 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

Welcome to the Second ACM International Workshop on Mobility in the Evolving Internet Architecture (MobiArch'2007). We are delighted to see the workshop has attracted high quality submissions from international researchers in both academia and industry.

With the recent development of technologies in wireless access and mobile devices, terminal and network mobility has become an indispensable aspect of today's Internet vision, and this is likely to become yet more important in the future. However, issues like effective and scalable mobility management and optimization, locator-identifier split, multi-homing, data management, mobile delay tolerant networking, security and related operational and deployment concerns are still in their early stages of development. Moreover, the Internet architecture, its end-to-end principles, including naming, routing and addressing will surely require rethinking due to the massive penetration of mobility into the Internet. This workshop provides the opportunity to participate in the exploration of the state of the art research results in these areas.

Despite being the first workshop on mobility architecture at SIGCOMM, we received a total of 46 submissions from the US, Europe and Asia. The submitted papers underwent a rigorous review process and intensive discussions by Technical Program Committee members. Each paper received at least 3 reviews from Technical Program Committee members. To further improve the review process, we also invited external experts for additional reviews. Based on the received reviews, the program committee finally selected 11 papers for presentation.

We introduced a special agent mechanism to handle a paper from one of the program co-chairs. One Technical Program Committee member was chosen as the agent for the complete handling of the paper. The agent was responsible for finding reviewers, collecting reviews and making the final decision based on the score and detailed review relative to the rest of the submissions. The entire handling process was kept outside of the electronic conference management system, and kept away from the co-chairs. This process and associated rewarding experience, we believe, effectively allowed us to ensure the fairness of the workshop program.

Skip Table Of Content Section
SESSION: Mobility architectures
research-article
Mobility as an integrated service through the use of naming
Article No.: 1, Pages 1–6https://doi.org/10.1145/1366919.1366921

As Mobile IP is deployed, so the requirements for its deployment evolve, reflecting the actual use of IP networks today. This includes the ability to use Mobile IP with IPsec, NATs and multi-homed networks. Furthermore, new requirements arise as people ...

research-article
An architecture for seamless mobility in spontaneous wireless mesh networks
Article No.: 2, Pages 1–8https://doi.org/10.1145/1366919.1366922

In this paper, we consider spontaneous wireless mesh networks that can provide wide coverage connectivity to mobile nodes. Our mobility scheme builds upon separation between a persistent node identifier and its current address. When joining the mesh, a ...

research-article
A framework for evolutionary networking
Article No.: 3, Pages 1–8https://doi.org/10.1145/1366919.1366923

In Computer-Communication Networks, addressing and routing have been fundamental issues that have challenged researchers -- resulting in myriads of addressing and routing protocols. In recent times, self-configuration of nodes has become a necessity due ...

SESSION: Locator/identifier separation
research-article
Performance of host identity protocol on lightweight hardware
Article No.: 4, Pages 1–8https://doi.org/10.1145/1366919.1366925

The Host Identity Protocol (HIP) is being standardized by the IETF as a new solution for host mobility and multihoming in the Internet. HIP uses self-certifying public-private key pairs in combination with IPsec to authenticate hosts and protect user ...

research-article
Evaluating the benefits of the locator/identifier separation
Article No.: 5, Pages 1–6https://doi.org/10.1145/1366919.1366926

Since recent years, it has been recognized that the existing routing architecture of today's Internet is facing scalability problems. Single numbering space, multi-homing, and traffic engineering, are making routing tables of the default free zone to ...

research-article
Embedding identity in mobile environments
Article No.: 6, Pages 1–8https://doi.org/10.1145/1366919.1366927

Recent trends bring Identity concepts into the application layer, although usually focusing in web environments. While this enables new solutions, interactions and paradigms at the application layer, the lower layers are neglected, and considered ...

SESSION: Delay tolerant networks
research-article
Distributed community detection in delay tolerant networks
Article No.: 7, Pages 1–8https://doi.org/10.1145/1366919.1366929

Community is an important attribute of Pocket Switched Networks (PSN), because mobile devices are carried by people who tend to belong to communities. We analysed community structure from mobility traces and used for forwarding algorithms [12], which ...

research-article
Redundancy and distributed caching in mobile DTNs
Article No.: 8, Pages 1–7https://doi.org/10.1145/1366919.1366930

Delay tolerant networking (DTN) allows endpoints to exchange information in networks where end-to-end path may not exist at any given time. In this opportunistic model, routing and forwarding functionality in intermediate nodes enables data transfer ...

SESSION: Handover, multihoming and data management
research-article
Kerberized handover keying: a media-independent handover key management architecture
Article No.: 9, Pages 1–7https://doi.org/10.1145/1366919.1366932

This paper proposes a media-independent handover key management architecture that uses Kerberos for secure key distribution among a server, an authenticator, and a mobile node. With the proposed architecture, signaling for key distribution is based on ...

research-article
A policy management framework for flow distribution on multihomed end nodes
Article No.: 10, Pages 1–7https://doi.org/10.1145/1366919.1366933

A multihomed node has several paths with its correspondent, maintained by several multihoming protocols. The decision to route a packet over a specific path relies on filter rules, which result from the comparison between the path's characteristics and ...

research-article
The case for a unified extensible data-centric mobility infrastructure
Article No.: 11, Pages 1–6https://doi.org/10.1145/1366919.1366934

We present a unified, extensible data-centric mobility infrastructure based on declarative networks and composable distributed views over network, router, and host state. Declarative networks are a recent innovation for building extensible network ...

Contributors
  • The University of Göttingen
  • Nokia Bell Labs
  • Korea Advanced Institute of Science and Technology
  • Toyota InfoTechnology Center

Recommendations

Acceptance Rates

Overall Acceptance Rate 47 of 92 submissions, 51%
YearSubmittedAcceptedRate
MobiArch'2015960%
MobiArch '1612650%
MobiArch '1518633%
MobiArch '14171165%
MobiArch '1316850%
MobiArch '1114750%
Overall924751%