Skip to main content

Security-Effective Fast Authentication Mechanism for Network Mobility in Proxy Mobile IPv6 Networks

  • Conference paper
Computational Science and Its Applications – ICCSA 2012 (ICCSA 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7336))

Included in the following conference series:

Abstract

This paper reinforced security under the network evaluation of wire/wireless integration of NEMO (NEwork MObility) supporting mobility and network-based PMIPv6 (Proxy Mobile IPv6). It also proposes SK-L2AM (Symmetric Key-Based Local-Lighted Authentication Mechanism) based on simple key which reduces code calculation and authentication delay costs. Moreover, fast handoff technique was also adopted to reduce handoff delay time in PMIPv6 and X-FPMIPv6 (eXtension of Fast Handoff for PMIPv6) was used to support global mobility. In addition, AX-FPMIPv6 (Authentication eXtension of Fast Handoff for PMIPv6) is proposed which integrated SK-L2AM and X-FPMIPv6 by applying Piggybacks method to reduce the overhead of authentication and signaling. The AX-FPMIPv6 technique suggested in this paper shows that this technique is better than the existing schemes in authentication and handoff delay according to the performance analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Devarapalli, V., Wakikawa, R., Petrescu, A., Thubert, P.: Network Mobility (NEMO) Basic Support Protocol. IETF, RFC 3963 (January 2005)

    Google Scholar 

  2. Johnson, D., Perkins, C., Arkko, J.: Mobility support in IPv6. IETF, RFC 3775 (June 2004)

    Google Scholar 

  3. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  4. Narten, T., Nordmark, E., Simpson, W.: Neighbor discovery for IP version 6 (IPv6). RFC 2461 (December 1998)

    Google Scholar 

  5. Park, J.H., Jin, Q.: Effective session key distribution for secure fast handover in mobile networks. Telecommunication Systems 44(1-2), 97–107 (2009)

    Article  Google Scholar 

  6. Mishra, A., Shin, M.H., Petroni, N.L., Clancy, J.T., Arbauch, W.A.: Proactive key distribution using neighbor graphs. IEEE Wireless Communications 11(1), 26–36 (2004)

    Article  Google Scholar 

  7. de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: GenericAAA architecture. IETF RFC 2903 (August 2000)

    Google Scholar 

  8. Glass, S., Hiller, T., Jacobs, S., Perkins, C.: Mobile IP authentication, authorization, and accounting requirements. IETF RFC 2977 (October 2000)

    Google Scholar 

  9. Perkins, C.E.: Mobile IP joins forces with AAA. IEEE RFC 2976 (August 2000)

    Google Scholar 

  10. Calhoun, P., Johansson, T., Perkins, C., Hiller, T.: Diameter Mobile IPv4 application. IEEE RFC4004 (August 2005)

    Google Scholar 

  11. Fathi, H., Shin, S., Kobara, K., Chakraborty, S., Imai, H., Prasad, R.: LRAKE-based AAA for network mobility (NEMO) over wireless links. IEEE Journal on Selected Areas in Communications (JSAC) 24(9), 1725–1737 (2006)

    Article  Google Scholar 

  12. Hideki, I., Seonghan, S., Kanukuni, K.: Introduction to Leakage-Resilient Authenticated Key Exchanged Protocols and Their Applications. In: KIISC (December 2008)

    Google Scholar 

  13. Wang, Y., Luo, W., Shen, C.: Analysis on Imai-Shin’s LR-AKE Protocol for Wireless Network Security. In: Bond, P. (ed.) Communications and Networking in China. CCIS, vol. 26, pp. 84–89. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  14. Chubng, M.-C., Lee, J.-F.: A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks. Computer Networks (June 2011)

    Google Scholar 

  15. Li, D., Sampalli, S.: An efficient contributory group rekeying scheme based on hash functions for MANETs. In: IFIP International Conference on Network and Parallel Computing Workshops, pp. 191–198 (September 2007)

    Google Scholar 

  16. Ng, W.H.D., Sun, Z., Cruickshank, H.: Group key management with network mobility. In: 13th IEEE International Conference on Networks (ICON), vol. 2, pp. 716–721 (November 2005)

    Google Scholar 

  17. Kim, Y., Perrig, A., Tfsudik, G.: Group key agreement efficient in communication. IEEE Transactions on Computers 53(7), 905–921 (2004)

    Article  Google Scholar 

  18. El Malki, K. (ed.): Low-Latency Handoffs in Mobile IPv4. IETF RFC 4881 (June 2007)

    Google Scholar 

  19. Koodli, R. (ed.): Fast Handoffs for Mobile IPv6. IETF, RFC 4068(June 2005)

    Google Scholar 

  20. McCann, P.: Mobile IPv6 fast handoffs for 802.11 Networks. IETF RFC 4260 (November 2005)

    Google Scholar 

  21. Gundaveli, S., Leung, K., Devarapali, V., Chowdhury, K., Patil, B.: Proxy Mobile IPv6. IETF RFC 5213 (August 2008)

    Google Scholar 

  22. Lee, K.-H., Lee, H.-W., Ryu, W., Han, Y.-H.: A scalable network-based mobility management framework in heterogeneous IP-based networks. Telecommunication Systems (June 2011)

    Google Scholar 

  23. Na, J.-H., Park, S., Moon, J.-M., Lee, S., Lee, E., Kim, S.-H.: Roaming Mechanism between PMIPv6 Domain (July 2008), draft-park-netmm-pmipv6-roaming-o1.txt

  24. Chen, Y.-S., Chuang, M.-C., Chen, C.-K.: DeuceScan:deuce-based fast handoff scheme in IEEE 802.11 wireless networks. In: IEEE Transaction on Vehicular Technology Conference, vol. 57(2), pp. 1126–1141 (September 2008)

    Google Scholar 

  25. NIST, U.S. Department of Commerce. Secure Hash Standard. U.S.Federal Information Processing Standard (FIPS) (August 2002)

    Google Scholar 

  26. Thomson, S., Narten, T.: IPv6 stateless address autoconfiguration. IETF RFC 2462 (December 1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Im, I., Cho, YH., Choi, JY., Jeong, J. (2012). Security-Effective Fast Authentication Mechanism for Network Mobility in Proxy Mobile IPv6 Networks. In: Murgante, B., et al. Computational Science and Its Applications – ICCSA 2012. ICCSA 2012. Lecture Notes in Computer Science, vol 7336. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31128-4_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31128-4_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31127-7

  • Online ISBN: 978-3-642-31128-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics