Abstract
This paper reinforced security under the network evaluation of wire/wireless integration of NEMO (NEwork MObility) supporting mobility and network-based PMIPv6 (Proxy Mobile IPv6). It also proposes SK-L2AM (Symmetric Key-Based Local-Lighted Authentication Mechanism) based on simple key which reduces code calculation and authentication delay costs. Moreover, fast handoff technique was also adopted to reduce handoff delay time in PMIPv6 and X-FPMIPv6 (eXtension of Fast Handoff for PMIPv6) was used to support global mobility. In addition, AX-FPMIPv6 (Authentication eXtension of Fast Handoff for PMIPv6) is proposed which integrated SK-L2AM and X-FPMIPv6 by applying Piggybacks method to reduce the overhead of authentication and signaling. The AX-FPMIPv6 technique suggested in this paper shows that this technique is better than the existing schemes in authentication and handoff delay according to the performance analysis.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Devarapalli, V., Wakikawa, R., Petrescu, A., Thubert, P.: Network Mobility (NEMO) Basic Support Protocol. IETF, RFC 3963 (January 2005)
Johnson, D., Perkins, C., Arkko, J.: Mobility support in IPv6. IETF, RFC 3775 (June 2004)
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770–772 (1981)
Narten, T., Nordmark, E., Simpson, W.: Neighbor discovery for IP version 6 (IPv6). RFC 2461 (December 1998)
Park, J.H., Jin, Q.: Effective session key distribution for secure fast handover in mobile networks. Telecommunication Systems 44(1-2), 97–107 (2009)
Mishra, A., Shin, M.H., Petroni, N.L., Clancy, J.T., Arbauch, W.A.: Proactive key distribution using neighbor graphs. IEEE Wireless Communications 11(1), 26–36 (2004)
de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: GenericAAA architecture. IETF RFC 2903 (August 2000)
Glass, S., Hiller, T., Jacobs, S., Perkins, C.: Mobile IP authentication, authorization, and accounting requirements. IETF RFC 2977 (October 2000)
Perkins, C.E.: Mobile IP joins forces with AAA. IEEE RFC 2976 (August 2000)
Calhoun, P., Johansson, T., Perkins, C., Hiller, T.: Diameter Mobile IPv4 application. IEEE RFC4004 (August 2005)
Fathi, H., Shin, S., Kobara, K., Chakraborty, S., Imai, H., Prasad, R.: LRAKE-based AAA for network mobility (NEMO) over wireless links. IEEE Journal on Selected Areas in Communications (JSAC) 24(9), 1725–1737 (2006)
Hideki, I., Seonghan, S., Kanukuni, K.: Introduction to Leakage-Resilient Authenticated Key Exchanged Protocols and Their Applications. In: KIISC (December 2008)
Wang, Y., Luo, W., Shen, C.: Analysis on Imai-Shin’s LR-AKE Protocol for Wireless Network Security. In: Bond, P. (ed.) Communications and Networking in China. CCIS, vol. 26, pp. 84–89. Springer, Heidelberg (2009)
Chubng, M.-C., Lee, J.-F.: A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks. Computer Networks (June 2011)
Li, D., Sampalli, S.: An efficient contributory group rekeying scheme based on hash functions for MANETs. In: IFIP International Conference on Network and Parallel Computing Workshops, pp. 191–198 (September 2007)
Ng, W.H.D., Sun, Z., Cruickshank, H.: Group key management with network mobility. In: 13th IEEE International Conference on Networks (ICON), vol. 2, pp. 716–721 (November 2005)
Kim, Y., Perrig, A., Tfsudik, G.: Group key agreement efficient in communication. IEEE Transactions on Computers 53(7), 905–921 (2004)
El Malki, K. (ed.): Low-Latency Handoffs in Mobile IPv4. IETF RFC 4881 (June 2007)
Koodli, R. (ed.): Fast Handoffs for Mobile IPv6. IETF, RFC 4068(June 2005)
McCann, P.: Mobile IPv6 fast handoffs for 802.11 Networks. IETF RFC 4260 (November 2005)
Gundaveli, S., Leung, K., Devarapali, V., Chowdhury, K., Patil, B.: Proxy Mobile IPv6. IETF RFC 5213 (August 2008)
Lee, K.-H., Lee, H.-W., Ryu, W., Han, Y.-H.: A scalable network-based mobility management framework in heterogeneous IP-based networks. Telecommunication Systems (June 2011)
Na, J.-H., Park, S., Moon, J.-M., Lee, S., Lee, E., Kim, S.-H.: Roaming Mechanism between PMIPv6 Domain (July 2008), draft-park-netmm-pmipv6-roaming-o1.txt
Chen, Y.-S., Chuang, M.-C., Chen, C.-K.: DeuceScan:deuce-based fast handoff scheme in IEEE 802.11 wireless networks. In: IEEE Transaction on Vehicular Technology Conference, vol. 57(2), pp. 1126–1141 (September 2008)
NIST, U.S. Department of Commerce. Secure Hash Standard. U.S.Federal Information Processing Standard (FIPS) (August 2002)
Thomson, S., Narten, T.: IPv6 stateless address autoconfiguration. IETF RFC 2462 (December 1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Im, I., Cho, YH., Choi, JY., Jeong, J. (2012). Security-Effective Fast Authentication Mechanism for Network Mobility in Proxy Mobile IPv6 Networks. In: Murgante, B., et al. Computational Science and Its Applications – ICCSA 2012. ICCSA 2012. Lecture Notes in Computer Science, vol 7336. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31128-4_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-31128-4_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31127-7
Online ISBN: 978-3-642-31128-4
eBook Packages: Computer ScienceComputer Science (R0)