Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes

  • Ilsun You
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3983)


In order to enhance the route optimization mode, the OMIPv6 and CGA-OMIPv6 protocols have been proposed. They use public key methods to minimize the amount of signaling messages and handover latency. However, since the public key operations are computationally expensive, it is so difficult for the protocols to support low-power mobile nodes. In this paper, we propose an enhanced OMIPv6 protocol. By employing the home agent as a security proxy, the proposed protocol improves the CGA-OMIPv6 protocol to support low-power mobile nodes. As a result, the proposed protocol significantly reduces the computational cost of the mobile node into just two HMAC and two hash operations. Furthermore, it achieves good scalability and manageability through the bind between the home agent’s address and public key.


Mobile Node Home Agent Correspondent Node Handover Latency IPv6 Address 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6, RFC 3775 (June 2004)Google Scholar
  2. 2.
    Haddad, W., Dupont, F., Madour, L., Krishnan, S., Park, S.: Optimizing Mobile IPv6 (OMIPv6) (Work in progress) (February 2004) draft-haddad-mipv6-omipv6-01.txtGoogle Scholar
  3. 3.
    Haddad, W., Madour, L., Arkko, J., Dupont, F.: Applying Cryptographically Generated Addresses to Optimize MIPv6 (CGA-OMIPv6) (Work in progress) (May 2005) draft-haddad-mip6-cga-omipv6-04Google Scholar
  4. 4.
    Aura, T.: Cryptographically Generated Addresses (CGA), RFC 3972 (March 2005)Google Scholar
  5. 5.
    Deng, R., Zhou, J., Bao, F.: Defending Against Redirect attacks in Mobile IP. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (November 2002)Google Scholar
  6. 6.
    Lee, Y., You, I., Rhee, S.: Improving CAM-DH protocol for mobile nodes with constraint computational power. In: Negoita, M.G., Howlett, R.J., Jain, L.C. (eds.) KES 2004. LNCS (LNAI), vol. 3215, pp. 67–73. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    You, I., Cho, K.: A security proxy based protocol for authenticating the mobile iPv6 binding updates. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 167–174. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Narten, T., Nordmark, E., Simpson, W.: Neighbor Discovery for IP Version 6 (IPv6), RFC 2461 (December 1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ilsun You
    • 1
  1. 1.Department of Information ScienceKorean Bible UniversitySeoulSouth Korea

Personalised recommendations