Skip to main content

Multihop Mobile Authentication for PMIP Networks

  • Chapter
  • First Online:
Secure IP Mobility Management for VANET

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

An important requirement for current mobile wireless networks, such as VANETs, is that they be able to provide ubiquitous and seamless IP communications in a secure way. Moreover, these networks are envisioned to support multihop communications, in which intermediate nodes help to relay packets between two peers in the network. Therefore, in infrastructure-connected multihop mobile networks, the connection from the mobile node (MN) to the point of attachment may traverse multiple hops (Fig. 3.1.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Grossglauser, M., Tse, D.: Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. Netw. 10(4), 477–486 (2002)

    Article  Google Scholar 

  2. Mahmoud, M.E., Shen, X.: PIS: A practical incentive system for multihop wireless networks. IEEE Trans. Veh. Technol. 59(8), 4012–4025 (2010). doi:10.1109/TVT.2010.2062549

    Article  Google Scholar 

  3. Taha, S., Céspedes, S., Shen, X.: EM3A: Efficient mutual multi-hop mobile authentication scheme for PMIP networks. In: Proceeding of IEEE ICC 2012. Ottawa, Canada (2012)

    Google Scholar 

  4. Céspedes, S., Taha, S., Shen, X.: A Multi-hop Authenticated Proxy Mobile IP Scheme for Asymmetric VANET, Vehicular Technology, IEEE Transactions on , vol. 99, pp.1–10. doi:10.1109/TVT.2013.2252931, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6480892&isnumber=4356907

  5. Blom, R.: An optimal class of symmetric key generation systems. In: Proceeding of the 84th Workshop on the Theory and Application of of Cryptographic Techniques, EUROCRYPT’85, pp. 335–338. Linz, Austria (1985)

    Google Scholar 

  6. Gupta, A., Mukherjee, A., Xie, B., Agrawal, D.P.: Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks. J. Parallel Distrib. Comput. 67(9), 981–991 (2007)

    Article  MATH  Google Scholar 

  7. Pillai, K., Sebastain, M.: A hierarchical and decentralized key establishment scheme for end-to-end security in heterogeneous networks. In: Proceeding of IEEE International Conference on Internet Multimedia Services Architecture and Applications, IMSAA 2009, pp. 1–6. Bangalore (2009). doi:10.1109/IMSAA.2009.5439493

  8. Zhu, H., Lin, X., Lu, R., Ho, P., Shen, X.: Slab: a secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans. Wireless Commun. 7(10), 3858–3868 (2008)

    Article  Google Scholar 

  9. Tang, C., Wu, D.: An efficient mobile authentication scheme for wireless networks. IEEE Trans. Wireless Commun. 7(4), 1408–1416 (2008). doi:10.1109/TWC.2008.061080

    Article  Google Scholar 

  10. Xie, B., Srinivasan, A., Agrawal, D.: GMSP: A generalized multi-hop security protocol for heterogeneous multi-hop wireless network. In: Proceeding of IEEE Wireless Communications and Networking Conference, WCNC 2006, vol. 2, pp. 634–639. Las Vegas, USA (2006). doi:10.1109/WCNC.2006.1683543

  11. Al Shidhani, A., Leung, V.C.M.: Secure and efficient multi-hop mobile IP registration scheme for MANET-internet integrated architecture. In: Proceeding of IEEE Wireless Communications and Networking Conference, WCNC 2010, pp. 1–6. Sydney, Australia (2006). doi:10.1109/WCNC.2010.5506193

  12. Catur Bhakti, M., Abdullah, A., Jung, L.: EAP-based authentication with EAP method selection mechanism. In: Proceeding of International Conference on Intelligent and Advanced Systems, ICIAS 2007, pp. 393–396. Kuala Lumpur, Malaysia (2007). doi:10.1109/ICIAS.2007.4658415

  13. Jiang, Y., Lin, C., Shen, X., Shi, M.: Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Trans. Wireless Commun. 5(9), 2569–2577 (2006). doi:10.1109/TWC.2006.05063

    Article  Google Scholar 

  14. Heer, T., Götz, S., Morchon, O.G., Wehrle, K.: Alpha: an adaptive and lightweight protocol for hop-by-hop authentication. In: Proceeding of The 4th ACM International Conference on Emerging Networking EXperiments and Technologies, ACM CoNEXT ’08, pp. 23:1–23:12. Madrid, Spain (2008)

    Google Scholar 

  15. Ristanovic, N., Papadimitratos, P., Theodorakopoulos, G., Hubaux, J.P., Le Boudec, J.Y.: Adaptive message authentication for multi-hop networks. In: Proceeding of 8th International Conference on Wireless On-Demand Network Systems and Services, WONS 2011, pp. 96–103. Bardonecchia, Italy (2011). doi:10.1109/WONS.2011.5720206

  16. Asefi, M., Cespedes, S., Shen, X., Mark, J.W.: A seamless quality-driven multi-hop data delivery scheme for video streaming in urban VANET scenarios. In: Proceeding of IEEE ICC 2011, pp. 1–5. Kyoto, Japan (2011). doi:10.1109/icc.2011.5962785

  17. Lee, M.J., Zhang, R., Zheng, J., Ahn, G.S., Zhu, C., Park, T.R.: IEEE 802.15.5 WPAN Mesh standard-low rate part: meshing the wireless sensor networks. IEEE J. Sel. Areas Commun. 28(7), 973–983 (2010)

    Article  Google Scholar 

  18. Hiertz, G., Zang, Y., Max, S., Junge, T., Weiss, E., Wolz, B., Denteneer, D., Berlemann, L., Mangold, S.: IEEE 802.11s: WLAN mesh standardization and high performance extensions. IEEE Netw. 22(3), 12–19 (2008). doi:10.1109/MNET.2008.4519960

    Google Scholar 

  19. Dai, W.: Crypto++ 5.6. 0 benchmarks. http://www.cryptopp.com/benchmarks.html

  20. Choi, J., Khaled, Y., Tsukada, M., Ernst, T.: Ipv6 support for vanet with geographical routing. In: Proceeding of 8th International Conference on ITS Telecommunications, ITST 2008, pp. 222–227. Phuket, Thailand (2008). doi:10.1109/ITST.2008.4740261

  21. Baldessari, R., Bernardos, C., Calderon, M.: Geosac-scalable address autoconfiguration for vanet using geographic networking concepts. In: Proceeding of 19th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, pp. 1–7. IEEE, French Riviera, France (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanaa Taha .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Taha, S., Shen, X. (2013). Multihop Mobile Authentication for PMIP Networks. In: Secure IP Mobility Management for VANET. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-01351-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01351-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01350-3

  • Online ISBN: 978-3-319-01351-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics