Hasan Tuncer, ... Nirmala Shenoy, in Computer Communications, 2012
Since its inception almost 40 years ago, the Internet has evolved and changed immensely. New technology solutions are desired to keep up with this unprecedented growth. Besides the traditional computing devices, different types of mobile devices need to be supported by the future Internet architecture. In this work, a survey of identity and handoff management solutions proposed in future Internet architectures is presented. Mobility protocols developed by the Internet Engineering Task Force initiatives are discussed to give the background on the user mobility support challenges with the current architecture. The next generation network architectures supported by global initiatives are presented and analyzed in terms of their support for seamless user and device mobility. Furthermore, this survey is extended to include the architectures proposed for wireless mesh networks, which are envisioned to be a part of the next generation networks with their self organizing and self configuring network characteristics.
4.5.1 Identity management in DAIDALOS
DAIDALOS architecture supplies Virtual Identity (VID) Framework in which a profile of an entity (single user or group of users) may stem from contracts with different networks and services. Subsets of this entity profile are called entity profile views, that are the virtual IDs of the entity. A user can choose the virtual identity – service provider mapping. After virtual identity is confirmed by the service provider, the entity gets an IP address tied to that virtual identity . Virtual identity concept requires ID-Broker, that supplies entity’s location to correspondent node and proxies the request to the entity and ID-Manager. ID-Manager provides interface for creating, managing, and destroying virtual identities by abstracting entity’s physical interfaces.
DAIDALOS also provides Virtual MAC infrastructure, which enables an entity to have two or more virtual identities bind to one physical interface to be able to access different providers. These virtual identities can be expanded to the relationships between banks, governmental institutions, operators, and service providers.