Skip to main content

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 110))

Abstract

Proxy Mobile IPv6 (PMIPv6) is an emerging network-based localized mobility management scheme. Recently, Zhou, Zhang and Qin proposed an authentication method for PMIPv6. However, this paper shows that their scheme fails to achieve mutual authentication between the Mobile Node (MN) and network. It performs only unilateral authentication of the MN to network, and the MN has no information about the authenticity of the network, thus it is susceptible to network spoofing attack and malicious MAG attack. Then, an improved scheme is proposed to remedy these security flaws.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gundavelli, S., Leung, K., Devarapalli, V., Wichorus, Chowdhury, K., Patil, B.: Proxy mobile IPv6, IETF Internet Draft, deaft-ietf-netlmm-proxymip6-18.txt (May 2008)

    Google Scholar 

  2. Kong, K., Lee, W., Han, Y., Shin, M., You, H.: Mobility Management for All-IP Mobile Networks: Mobile IPv6 vs. Proxy Mobile IPv6. IEEE Wireless Communications 15(2), 36–45 (2008)

    Article  Google Scholar 

  3. Zhou, H., Zhang, H., Qin, Y.: An authentication method for proxy mobile IPv6 and performance analysis. Security and Communication Networks 2(5), 445–454 (2009)

    Article  Google Scholar 

  4. Elgoarany, K., Eltoweissy, M.: Security in Mobile Ipv6: A Survey. Information Security Tech. Report 12(1), 32–43 (2007)

    Article  Google Scholar 

  5. Vogt, C., Kempf, J.: Security threats to network-based localized mobility management (NetLMM). IETF RFC4832 (April 2007)

    Google Scholar 

  6. Lee, J., Lee, J., Chung, T.: Ticket-based Authentication Mechanism for Proxy Mobile IPv6 Environment. In: Proceedings of the Third International Conference on Systems and Networks Communications (ICSNC 2008), pp. 304–309. IEEE Computer Society (2008)

    Google Scholar 

  7. Kim, H., Oh, B.: Secure and low latency handoff scheme for proxy mobile IPv6. In: Proceedings of the International Conference on Mobile Technology, Applications & Systems (Mobility Conference 2008). ACM Press (September 2008)

    Google Scholar 

  8. Mun, Y., Kim, M., Kim, G.: Mutual Authentication Scheme in Proxy Mobile IP. In: Proceedings of International Conference on Computational Sciences and Its Applications, ICCSA 2008, pp. 65–72. IEEE Computer Society (2008)

    Google Scholar 

  9. Park, S., Lee, J., Chung, T.: Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2009. LNCS, vol. 5592, pp. 885–896. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Lee, J., Chung, T.: A Traffic Analysis of Authentication Methods for Proxy Mobile IPv6. In: Proceedings of International Conference on Information Security and Assurance (ISA 2008), pp. 512–517. IEEE Computer Society (2008)

    Google Scholar 

  11. Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter base protocol. IETF RFC 3588 (September 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jiang, Q., Ma, J., Li, G., Ye, A. (2011). Security Enhancement on an Authentication Method for Proxy Mobile IPv6. In: Jiang, L. (eds) Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, Australia. Advances in Intelligent and Soft Computing, vol 110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25185-6_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25185-6_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25184-9

  • Online ISBN: 978-3-642-25185-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics