Performance Evaluation of MACSec for Host Mobility

Sangjun Ahn, Dongcheon Shin


It is essential to consider the relationships between each component in the communication infrastructure in order to build and optimize the infrastructure. In this paper, based on the major factors to consider for the optimized communication infrastructure, we propose an enhanced MACSec-based deployment mechanism for communication infrastructure. The proposed MACSec mechanism can replace the IPSec without the additional devices and redesign of the communication infrastructure. In addition, we evaluate the performance of MACSec and IPSec in terms of the major factors such as message overhead, encryption processing, and host mobility. According to the evaluation results, we can say that MACSec is superior to IPSec with regard to mobility as well as hop delay and message overhead.

Full Text:



Altunbasak, H., Krasser, S., Owen, H. L., Grimminger, J., Huth, H. P., and Sokol, J., “Securing Layer 2 in Local Area Networks,” Networking-ICN, pp. 699-706, 2005.

Barceló, F., Paradells, J., Setaki, F., and Gibeaux, M., “Design and Modeling of Internode: A Mobile Provider Provisioned VPN,” Mobile Networks and Applications, Vol. 8, No. 1, pp. 51-60, 2003.

Beauchamps, M., Hoitjink, M., and Leese, M., “Introduction: Security/Mobility and the Politics of Movement,” Manchester University Press, pp. 1-13, 2017.

Choi, W. G. and Lee, Y. J., “Factors Influencing the Introduction of Mobile Security Technology,” The Journal of Society for e-Business Studies, Vol. 18, No. 4, pp. 215-240, 2013.

Croitoru, A., Niculescu, D., and Raiciu, C., “Towards WiFi Mobility without Fast Handover,” Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, pp. 219-234, 2015.

Dutta, A. and Shulzrinne, H., “Mobility Protocols and Handover Optimization,” John Wiley & Sons, Ltd-IEEE Press, 2014.

Gu, R., Zhang, X., Yu, L., and Zhang, J., “Enhancing Security and Scalability in Software Defined LTE Core Networks,” 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering(TrustCom/BigDataSE), IEEE, 2018.

IEEE Std. 802.1AE, “Media Access Control (MAC) Security,” 2006.

Jaggi, C., “Ethernet Encryptors for Metro and Carrier Ethernet,”, 2017.

John, W., Pentikousis, K., Agapiou, G., Jacob, E., Kind, M., Manzalini, A., Risso, F., Staessens, D., Steinert, R., and Meirosu, C., “Research Directions in Network Service Chaining,” SDN4FNS 2013 Workshop on Software Defined Networks for Future Networks and Services, IEEE SDN, pp. 1-7, 2013.

Lee, S. and Jahng, J., “The Diffusion of Internet of Things: Forecasting Technologies and Company Strategies using Qualitative and Quantitative Approach,” The Journal of Society for e-Business Studies, Vol. 20, No. 4, pp. 19-39, 2015.

McCann, P., “Mobile IPv6 Fast Handovers for 802.11 Networks,” IETF RFC 4260, November 2005.

Quinn, P. and Nadeau, T., “Problem Statement for Service Function Chaining,” IETF RFC 7498, April 2015.

Shin, H., Song, Y. U., Sung, N. H., “The Impact of Perception on the Difference Between Mobile and Stationary Internet Toward the Intention to Use Mobile Internet,” The Journal of Society for e-Business Studies, Vol. 15, No. 3, pp. 99-129, 2010.


  • There are currently no refbacks.