Advertisement

SAAS: A Secure Anonymous Authentication Scheme for PMIPv6

  • Tianhan GaoEmail author
  • Xinyang Deng
  • Fanghua Geng
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 971)

Abstract

Proxy MIPv6 (PMIPv6) provides network-based mobility management without the participation of mobile node. Security and privacy issues are the main obstacles during mobile’s access authentication in PMIPv6 network. A secure anonymous authentication scheme (SAAS) based on proxy group signature is proposed in this paper to achieve mutual authentication between mobile node and mobility access gateway. Anonymity is guaranteed through the identity-based proxy group signature. The formal security proof through SVO logic and the performance analysis demonstrate that the proposed scheme is both robust and efficient.

Keywords

PMIPv6 Identity-based proxy group signature Anonymous authentication Mutual authentication 

References

  1. 1.
    Johnson, D., Perkins, C., Arkko, J.: Mobility support in IPv6. Technical report (2004)Google Scholar
  2. 2.
    Bhargava, B., Johnson, A.M., Munyengabe, G.I., Angin, P.: A systematic approach for attack analysis and mitigation in V2V networks. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 7(1), 79–96 (2016)Google Scholar
  3. 3.
    Sanchez-Iborra, R., et al.: Integrating LP-WAN communications within the vehicular ecosystem. J. Internet Serv. Inf. Secur. 7(4), 45–56 (2017)Google Scholar
  4. 4.
    Taqieddin, E., Awad, F., Ahmad, H.: Location-aware and mobility-based performance optimization for wireless sensor networks. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 8(4), 37–59 (2017)Google Scholar
  5. 5.
    Weng, C.-E., Sharma, V., Chen, H.-C., Mao, C.-H.: PEER: proximity-based energy-efficient routing algorithm for wireless sensor networks. J. Internet Serv. Inf. Secur. 6(1), 47–56 (2016)Google Scholar
  6. 6.
    Wu, T.-Y., Chen, W., Lee, W.-T., Liu, F.-H., Huang, Y.-P.: SeMIPv6: secure and efficient roaming mechanism based on IEEE 802.11 r and MIH. J. Internet Technol. 11(7), 909–916 (2010)Google Scholar
  7. 7.
    Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., Patil, B.: Proxy mobile IPv6. Technical report (2008)Google Scholar
  8. 8.
    Kang, D., Jung, J., Lee, D., et al.: Security analysis and enhanced user authentication in proxy mobile IPv6 networks. Plos One 12(7), e0181031 (2017)CrossRefGoogle Scholar
  9. 9.
    Song, J., Han, S.: One-time key authentication protocol for PMIPv6. In: Third International Conference on Convergence and Hybrid Information Technology, ICCIT 2008, vol. 2, pp. 1150–1153. IEEE (2008)Google Scholar
  10. 10.
    Chuang, M.-C., Lee, J.-F.: SF-PMIPv6: a secure fast handover mechanism for proxy mobile IPv6 networks. J. Syst. Softw. 86(2), 437–448 (2013)CrossRefGoogle Scholar
  11. 11.
    Chuang, M.-C., Lee, J.-F., Chen, M.-C.: SPAM: a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks. IEEE Syst. J. 7(1), 102–113 (2013)CrossRefGoogle Scholar
  12. 12.
    Zubair, M., Kong, X., Mahfooz, S.: CLAM: cross-layer localized authentication mechanism based on proxy MIPv6 and SIP in next generation networks. J. Commun. 9(2), 144–156 (2014)CrossRefGoogle Scholar
  13. 13.
    Kim, J.H., Song, J.S.: A public key based PMIPv6 authentication scheme. In: 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS), pp. 5–10. IEEE (2014)Google Scholar
  14. 14.
    Agarwal, N., Rana, A., Pandey, J.P.: Proxy signatures for secured data sharing. In: Cloud System and Big Data Engineering, pp. 255–258. IEEE (2016)Google Scholar
  15. 15.
    Wu, K., Zou, J., Wei, X.-H., Liu, F.-Y.: Proxy group signature: a new anonymous proxy signature scheme. In: Machine Learning, vol. 3, pp. 1369–1373. IEEE (2008)Google Scholar
  16. 16.
    Han, S., Wang, J., Liu, W.: An efficient identity-based group signature scheme over elliptic curves. In: Freire, M.M., Chemouil, P., Lorenz, P., Gravey, A. (eds.) ECUMN 2004. LNCS, vol. 3262, pp. 417–429. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-30197-4_42CrossRefGoogle Scholar
  17. 17.
    Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005).  https://doi.org/10.1007/11593447_28CrossRefGoogle Scholar
  18. 18.
    Yokota, H.: Fast handovers for proxy mobile IPv6. Heise Zeitschriften Verlag (2010)Google Scholar
  19. 19.
    Syverson, P.F., Oorschot, P.C.V.: On unifying some cryptographic protocol logics. In: Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 14–28 (1994)Google Scholar
  20. 20.
    Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proc. R. Soc. Math. Phys. Eng. Sci. 426(1871), 1–13 (1989)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Lee, J.H., Bonnin, J.M.: HOTA: handover optimized ticket-based authentication in network-based mobility management. Inf. Sci. 230(4), 64–77 (2013)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Zhang, L., Mo, T., Zhao, L.: Authentication scheme based on certificateless signcryption in proxy mobile IPv 6 network. Jisuanji Yingyong Yanjiu 29(2), 640–643 (2012)Google Scholar
  23. 23.
    Gao, T., Tan, L., Qiao, P., Yim, K.: An access authentication scheme based on hierarchical IBS for proxy mobile IPv6 network. Intell. Autom. Soft Comput. 22(3), 389–396 (2016)CrossRefGoogle Scholar
  24. 24.
    Konstantinou, E.: Efficient cluster-based group key agreement protocols for wireless ad hoc networks. J. Netw. Comput. Appl. 34(1), 384–393 (2011)MathSciNetCrossRefGoogle Scholar
  25. 25.
    Xiong, X., Wong, D.S., Deng, X.: TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: 2010 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6. IEEE (2010)Google Scholar
  26. 26.
    Tian, Y., Zhang, Y., Zhang, H., Li, Z.: Identity-based hierarchical access authentication in mobile IPv6 networks. In: IEEE International Conference on Communications, ICC 2006, vol. 5, pp. 1953–1958. IEEE (2006)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Northeastern UniversityShenyangChina

Personalised recommendations