Abstract
Proxy Mobile IPv6 (PMIPv6) is an emerging network-based localized mobility management scheme. Recently, Zhou, Zhang and Qin proposed an authentication method for PMIPv6. However, this paper shows that their scheme fails to achieve mutual authentication between the Mobile Node (MN) and network. It performs only unilateral authentication of the MN to network, and the MN has no information about the authenticity of the network, thus it is susceptible to network spoofing attack and malicious MAG attack. Then, an improved scheme is proposed to remedy these security flaws.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gundavelli, S., Leung, K., Devarapalli, V., Wichorus, Chowdhury, K., Patil, B.: Proxy mobile IPv6, IETF Internet Draft, deaft-ietf-netlmm-proxymip6-18.txt (May 2008)
Kong, K., Lee, W., Han, Y., Shin, M., You, H.: Mobility Management for All-IP Mobile Networks: Mobile IPv6 vs. Proxy Mobile IPv6. IEEE Wireless Communications 15(2), 36–45 (2008)
Zhou, H., Zhang, H., Qin, Y.: An authentication method for proxy mobile IPv6 and performance analysis. Security and Communication Networks 2(5), 445–454 (2009)
Elgoarany, K., Eltoweissy, M.: Security in Mobile Ipv6: A Survey. Information Security Tech. Report 12(1), 32–43 (2007)
Vogt, C., Kempf, J.: Security threats to network-based localized mobility management (NetLMM). IETF RFC4832 (April 2007)
Lee, J., Lee, J., Chung, T.: Ticket-based Authentication Mechanism for Proxy Mobile IPv6 Environment. In: Proceedings of the Third International Conference on Systems and Networks Communications (ICSNC 2008), pp. 304–309. IEEE Computer Society (2008)
Kim, H., Oh, B.: Secure and low latency handoff scheme for proxy mobile IPv6. In: Proceedings of the International Conference on Mobile Technology, Applications & Systems (Mobility Conference 2008). ACM Press (September 2008)
Mun, Y., Kim, M., Kim, G.: Mutual Authentication Scheme in Proxy Mobile IP. In: Proceedings of International Conference on Computational Sciences and Its Applications, ICCSA 2008, pp. 65–72. IEEE Computer Society (2008)
Park, S., Lee, J., Chung, T.: Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2009. LNCS, vol. 5592, pp. 885–896. Springer, Heidelberg (2009)
Lee, J., Chung, T.: A Traffic Analysis of Authentication Methods for Proxy Mobile IPv6. In: Proceedings of International Conference on Information Security and Assurance (ISA 2008), pp. 512–517. IEEE Computer Society (2008)
Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter base protocol. IETF RFC 3588 (September 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jiang, Q., Ma, J., Li, G., Ye, A. (2011). Security Enhancement on an Authentication Method for Proxy Mobile IPv6. In: Jiang, L. (eds) Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, Australia. Advances in Intelligent and Soft Computing, vol 110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25185-6_45
Download citation
DOI: https://doi.org/10.1007/978-3-642-25185-6_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25184-9
Online ISBN: 978-3-642-25185-6
eBook Packages: EngineeringEngineering (R0)