Welcome to the Second ACM International Workshop on Mobility in the Evolving Internet Architecture (MobiArch'2007). We are delighted to see the workshop has attracted high quality submissions from international researchers in both academia and industry.
With the recent development of technologies in wireless access and mobile devices, terminal and network mobility has become an indispensable aspect of today's Internet vision, and this is likely to become yet more important in the future. However, issues like effective and scalable mobility management and optimization, locator-identifier split, multi-homing, data management, mobile delay tolerant networking, security and related operational and deployment concerns are still in their early stages of development. Moreover, the Internet architecture, its end-to-end principles, including naming, routing and addressing will surely require rethinking due to the massive penetration of mobility into the Internet. This workshop provides the opportunity to participate in the exploration of the state of the art research results in these areas.
Despite being the first workshop on mobility architecture at SIGCOMM, we received a total of 46 submissions from the US, Europe and Asia. The submitted papers underwent a rigorous review process and intensive discussions by Technical Program Committee members. Each paper received at least 3 reviews from Technical Program Committee members. To further improve the review process, we also invited external experts for additional reviews. Based on the received reviews, the program committee finally selected 11 papers for presentation.
We introduced a special agent mechanism to handle a paper from one of the program co-chairs. One Technical Program Committee member was chosen as the agent for the complete handling of the paper. The agent was responsible for finding reviewers, collecting reviews and making the final decision based on the score and detailed review relative to the rest of the submissions. The entire handling process was kept outside of the electronic conference management system, and kept away from the co-chairs. This process and associated rewarding experience, we believe, effectively allowed us to ensure the fairness of the workshop program.
Proceeding Downloads
Mobility as an integrated service through the use of naming
As Mobile IP is deployed, so the requirements for its deployment evolve, reflecting the actual use of IP networks today. This includes the ability to use Mobile IP with IPsec, NATs and multi-homed networks. Furthermore, new requirements arise as people ...
An architecture for seamless mobility in spontaneous wireless mesh networks
- Franck Rousseau,
- Yan Grunenberger,
- Vincent Untz,
- Eryk Schiller,
- Paul Starzetz,
- Fabrice Theoleyre,
- Martin Heusse,
- Olivier Alphand,
- Andrzej Duda
In this paper, we consider spontaneous wireless mesh networks that can provide wide coverage connectivity to mobile nodes. Our mobility scheme builds upon separation between a persistent node identifier and its current address. When joining the mesh, a ...
A framework for evolutionary networking
In Computer-Communication Networks, addressing and routing have been fundamental issues that have challenged researchers -- resulting in myriads of addressing and routing protocols. In recent times, self-configuration of nodes has become a necessity due ...
Performance of host identity protocol on lightweight hardware
The Host Identity Protocol (HIP) is being standardized by the IETF as a new solution for host mobility and multihoming in the Internet. HIP uses self-certifying public-private key pairs in combination with IPsec to authenticate hosts and protect user ...
Evaluating the benefits of the locator/identifier separation
Since recent years, it has been recognized that the existing routing architecture of today's Internet is facing scalability problems. Single numbering space, multi-homing, and traffic engineering, are making routing tables of the default free zone to ...
Embedding identity in mobile environments
Recent trends bring Identity concepts into the application layer, although usually focusing in web environments. While this enables new solutions, interactions and paradigms at the application layer, the lower layers are neglected, and considered ...
Distributed community detection in delay tolerant networks
Community is an important attribute of Pocket Switched Networks (PSN), because mobile devices are carried by people who tend to belong to communities. We analysed community structure from mobility traces and used for forwarding algorithms [12], which ...
Redundancy and distributed caching in mobile DTNs
Delay tolerant networking (DTN) allows endpoints to exchange information in networks where end-to-end path may not exist at any given time. In this opportunistic model, routing and forwarding functionality in intermediate nodes enables data transfer ...
Kerberized handover keying: a media-independent handover key management architecture
This paper proposes a media-independent handover key management architecture that uses Kerberos for secure key distribution among a server, an authenticator, and a mobile node. With the proposed architecture, signaling for key distribution is based on ...
A policy management framework for flow distribution on multihomed end nodes
A multihomed node has several paths with its correspondent, maintained by several multihoming protocols. The decision to route a packet over a specific path relies on filter rules, which result from the comparison between the path's characteristics and ...
The case for a unified extensible data-centric mobility infrastructure
We present a unified, extensible data-centric mobility infrastructure based on declarative networks and composable distributed views over network, router, and host state. Declarative networks are a recent innovation for building extensible network ...
Cited By
-
Kadar I, Chen K and Shen H (2014). A social-based cyber-physical system for distributed message transmission SPIE Defense + Security, 10.1117/12.2050163, , (90911M), Online publication date: 20-Jun-2014.
-
Suresh R, Gao W and Li Y (2014). On investigating social dynamics in tactical opportunistic mobile networks SPIE Defense + Security, 10.1117/12.2050802, , (909606), Online publication date: 17-Jun-2014.
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
MobiArch'20 | 15 | 9 | 60% |
MobiArch '16 | 12 | 6 | 50% |
MobiArch '15 | 18 | 6 | 33% |
MobiArch '14 | 17 | 11 | 65% |
MobiArch '13 | 16 | 8 | 50% |
MobiArch '11 | 14 | 7 | 50% |
Overall | 92 | 47 | 51% |