Skip to main content

Secure Mobility Management Based on Session Key Agreements

  • Conference paper
Cyberspace Safety and Security (CSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7672))

Included in the following conference series:

  • 2417 Accesses

Abstract

The issue of securing control signaling in mobility management is still an unsolved concern. To offer enhanced security, features in the recent mobile IP protocols rely on the use of IP Security (IPSec) Security Association (SA). However, the SA itself will cease to be valid if a mobile node moves or a network moves. This paper proposes secure mobile IP (SecMIP) scheme based on one-time transaction key agreements instead of using the pre-generated IPsec SA. In the proposed scheme, the mobile node is responsible for relaying its blind key information from the Home Agent (HA) to the Foreign Agent (FA) while the relating secret value is securely kept in its HA. Receiving the Binding Update (BU) message that contains the FA’s blind key, the HA can calculate the same transaction key as the FA. We analyze the time required for the enemy to succeed to attack our SecMIP scheme on integrity and authentication. Based on the analysis results, we suggest the optimum use of the operational parameters in our SecMIP scheme relating to the length of the secret value and the length of the prime number q in digit. The derived dimensions can guarantee an average of 1 year required for exhaustive key searching by brute force approaches while maintaining a maximum addition of 200 millisecond time latency for the HA and the FA to process the secured BU message.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, R., Wei, Y., Lin, H., Yang, R., Wang, S., Wang, H.: Mobility Management for Global IP Connectivity of MANET. In: 5th IEEE Emergency Situations, Consumer Communications and Networking Conference, CCNC 2008, January 10-12, pp. 217–221 (2008)

    Google Scholar 

  2. Jung, Y.C., Peradilla, M.: Tunnel Gateway Satisfying Mobility and Security Requirements of Mobile and IP-Based Networks. Journal of Communications and Networks 13(6), 583–590 (2011)

    Article  Google Scholar 

  3. Rehunathan, D., Atkinson, R., Bhatti, S.: Enabling Mobile Networks through secure naming. In: IEEE Military Communications Conference, MILCOM 2009, October 18-21, pp. 1–8 (2009)

    Google Scholar 

  4. Ghosh, A., Talpade, R., Elaoud, M., Bereschinsky, M.: Securing ad-hoc networks using IPsec. In: IEEE Military Communications Conference, MILCOM 2005, vol. 5, pp. 2948–2953 (October 2005)

    Google Scholar 

  5. Moravejosharieh, A., Modares, H., Salleh, R.: Overview of Mobile IPv6 Security. In: 2012 Third International Conference on Intelligent Systems, Modelling and Simulation (ISMS), February 8-10, pp. 584–587 (2012)

    Google Scholar 

  6. Kandikattu, R., Jacob, L.: Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network. International Journal of Network Security 10(3), 190–203 (2010)

    Google Scholar 

  7. Perkins, C.: IP Mobility Support for IPv4, Network Working Group, RFC 3220 (January 2002)

    Google Scholar 

  8. Ding, S.: Mobile IP handoffs among multiple internet gateways in mobile ad hoc networks. Communications IET 3(5), 752–763 (2009)

    Article  Google Scholar 

  9. Khair, M.G., Kantarci, B., Mouftah, H.T.: Towards cellular IP address assignment in wireless heterogeneous sensor networks. In: 2011 IEEE Symposium on Computers and Communications (ISCC), June 28 -July 1, pp. 615–619 (2011)

    Google Scholar 

  10. Droms, F.R.: Dynamic Host Configuration Protocol, Network Working Group, RFC 2131 (March 1997)

    Google Scholar 

  11. Devarapalli, V., Wakikawa, R., Petrescu, A., Thubert, P.: Network Mobility (NEMO) Basic Support Protocol, RFC 3963 (January 2005)

    Google Scholar 

  12. Morera, R., McAuley, A.: Adapting DNS to dynamic ad hoc networks. In: IEEE Military Communications Conference 2005, MILCOM 2005, October 17-20, vol. 2, pp. 1303–1308 (2005)

    Google Scholar 

  13. Cheng, H., Maltz, D.A., Li, J., Greenberg, A.: Public DNS system and Global Traffic Management. In: 2011 Proceedings IEEE INFOCOM, April 10-15, pp. 2615–2623 (2011)

    Google Scholar 

  14. Jung, Y.,C., Atwood, J.W.: Design of robust DNS adaptable to dynamic Ad hoc networks. In: International Conference on DNS EASY (October 18, 2011)

    Google Scholar 

  15. Hu, P., Hong, P., Li, J.: Name resolution in on-demand MANET. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2005), August 22-24, vol. 3, pp. 462–466 (2005)

    Google Scholar 

  16. Yahya, B., Ben-Othman, J.: Achieving host mobility using DNS dynamic updating protocol. In: 33rd IEEE Conference on Local Computer Networks, LCN 2008, October 14-17, pp. 634–638 (2008)

    Google Scholar 

  17. US DoD: High-Assurance IP Encryption Interoperability Specification (HAIPE IS), Version 1.3.5 (May 2004)

    Google Scholar 

  18. Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, RFC 2401 (November 1998)

    Google Scholar 

  19. Encarnacao, A., Bayer, G.: Mobile IPv6 Binding Update - Return Routability Procedure (2008)

    Google Scholar 

  20. Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6, IETF draft (June 2004)

    Google Scholar 

  21. Simpson, W.: IPng Mobility Considerations, RFC 1688 (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jung, Y., Festijo, E. (2012). Secure Mobility Management Based on Session Key Agreements. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35362-8_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35361-1

  • Online ISBN: 978-3-642-35362-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics