Secure and Scalable Mobile IP Registration Scheme Using PKI

  • Jae-Pil Yoo
  • Keecheon Kim
  • Hyunseung Choo
  • Jae-il Lee
  • Joo Seok Song
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2668)


Mobile IP gets its firm position as a layer-3 mobility protocol for the 3rd generation and beyond the 3rd generation communication system. Nevertheless, due to the security defects caused by adapting MIP for real service, several systems such as AAA infrastructure have been introduced. On the other hand, PKI infrastructure is considered to be a core standard infrastructure to handle the authentication and secure channel for the present and future network. In this paper, we suggest a secure registration scheme with authentication using PKI infrastructure. Suggested scheme produces less static key management overhead compared with legacy scheme and supports the previously deployed standard authentication infrastructure. Especially, it has a feature that supports mobile communication system. Secure re-distribution of dynamic session key using asymmetric key and the optimized authentication roundtrip time for handoffs shows such a feature.


Mobile Node Mobile Agent Authentication Scheme Home Agent Home Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    TIA/EIA TR45.6, “cdma2000 Wireless IP Network Standard”, TIA Standard, June 2002.Google Scholar
  2. [2]
    MWIF SG, “Network Reference Architecture MTR-004 R2.0, MTSG, June 2002.Google Scholar
  3. [3]
    Charles E. Perkins, Pat R. Calhoun, “ AAA Registration Keys for Mobile IP”, draft-ietf-mobileip-aaa-key-10.txt. October 2002.Google Scholar
  4. [4]
    C. E. Perkins, “IP Mobility Support for IPv4”, RFC3344, August 2002Google Scholar
  5. [5]
    Pat R. Calhoun, Tony Johansson, Charles E. Perkins, “ Diameter Mobile IPv4 Application”, draft-ietf-aaa-diameter-mobileip-13.txt, October 2002Google Scholar
  6. [6]
    Jacobs, Belgard, “Mobile IP Public Key Based Authentication”, Internet Draft, July 2001Google Scholar
  7. [7]
    Diana Berbecaru, Antonio Lioy, Marius Marian, “Security Aspects in Standard Certificate Revocation Mechanisms”, ISCC 2002, March 2002Google Scholar
  8. [8]
    A. Malpani, R. Housley, T. Freeman, “Simple Certificate Validation Protocol (SCVP)”, draft-ietf-pkix-scvp-10.txt, October 2002Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Jae-Pil Yoo
    • 1
  • Keecheon Kim
    • 1
  • Hyunseung Choo
    • 2
  • Jae-il Lee
    • 3
  • Joo Seok Song
    • 4
  1. 1.School of Computer Science & EngineeringKonkuk UniversitySeoulKorea
  2. 2.School of Information and Communication EngineeringSungkyunkwan UniversitySuwonKorea
  3. 3.Korea Information Security Agency(KISA)SeoulKorea
  4. 4.School of Computer ScienceYonsei UniversitySeoulKorea

Personalised recommendations