A Tokenized Binding Update Scheme for Next Generation Proxy IP Mobility

  • P. N. AnbarasiEmail author
  • Senthilkumar Mathi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 394)


At present, the users are apparently high for wireless networks. In proxy mobile IPv6, the mobility management among the networks is tedious for the location update of mobile node and the secrecy plays a tremendous role. Here, the messages are exchanged via a localized mobility anchor between the communicants. Consequently, the data traffic is high due to the centralized feature of local mobility anchor. Also there is a single point of failure and increase in the network cost. Therefore, the efficacy of the network is increased by distributing the functionality of local mobility anchor among the mobile access gateways present in the network. However, there are several security challenges such as denial-of-service, man-in-the-middle attack, etc. Thus, the network needs an enhancement for prevention of threat and location update of mobile node. Hence, the presented paper proposes a new tokenized binding update scheme by sharing a routing table. Here, the token of mobile node is incorporated in the routing table and shared among the mobile access gateways. In addition, the proposed scheme decreases the cost of signaling and traffic overhead by eliminating unnecessary queries for binding update and acknowledgment. The security of the scheme is validated using AVISPA—the model checker. From the security and numerical analyses, the proposed scheme shows the enhancement of security and significant reduction in the connection cost and data delivery cost when compared to the existing schemes.


Mobile IP Proxy Care-of-Address Mobile access gateway Local mobility anchor Distributed mobility management Token Routing table update Proxy binding update Proxy binding query 


  1. 1.
    Mathi S, Valarmathi ML. A secure and decentralized registration scheme for IPv6 network-based mobility. Int J Eng Technol. 2013;5:5.Google Scholar
  2. 2.
    Elgoarany K, Eltoweissy M. Security in mobile IPv6: a survey. Inf. Secur. Tech. Rep. 2007;12(1):32–43.CrossRefGoogle Scholar
  3. 3.
    Gundavelli S, Leung K, Devarapalli V, Chowdhury K, Patil B. Proxy mobile IPv6. RFC 5213, August 2008.Google Scholar
  4. 4.
    Liebsch M, Jeong S. Proxy Mobile IPv6 (PMIPv6) localized routing problem statement (2011).Google Scholar
  5. 5.
    Lei J, Fu X. Evaluating the benefits of introducing PMIPv6 for localized mobility management. In: Wireless Communications and Mobile Computing Conference, 2008. IWCMC’08. International. IEEE, 2008.Google Scholar
  6. 6.
    Krishnan S, et al. Localized routing for proxy mobile IPv6. draft-ietf-netext-pmIP-lr-01 (2010).Google Scholar
  7. 7.
    Bernardos CJ, De la Oliva A, Giust F. A PMIPv6-based solution for distributed mobility management. 2013.Google Scholar
  8. 8.
    Giust F, Bernardos CJ, de la Oliva A. Analytic evaluation and experimental validation of a network-based IPv6 distributed mobility management solution; 2014.Google Scholar
  9. 9.
    Viganò L. Automated security protocol analysis with the AVISPA tool. Electron Notes Theor Comput Sci. 2006;155:61–86.Google Scholar
  10. 10.
    Mathi S, Valarmathi ML. An efficacious and secure registration for internet protocol mobility. Def Sci J. 2013;63 5:502–507.Google Scholar
  11. 11.
    Olsen, AA. Extended AnB for Web Services; 2012.Google Scholar
  12. 12.
    Aura Tuomas. Mobile IPv6 Security. Security Protocols. Berlin: Springer; 2004.Google Scholar
  13. 13.
    Alsalihy WAHA, Alsayfi MSS. Integrating identity-based encryption in the return routability protocol to enhance signal security in mobile IPv6. Wirel Pers Commun. 2013;68 3:655–669.Google Scholar
  14. 14.
    Ali-Ahmad H, et al. Comparative performance analysis on dynamic mobility anchoring and proxy mobile IPv6. In: 15th international symposium on wireless personal multimedia communications (WPMC), IEEE; 2012.Google Scholar
  15. 15.
    Moravejosharieh A, Modares H, Salleh R. Overview of mobile IPv6 security. In: Third international conference on intelligent systems, modelling and simulation (ISMS), IEEE; 2012.Google Scholar
  16. 16.
    Kim, JI, Koh SJ. Distributed mobility management in proxy mobile IPv6 using hash function. In: International conference on information networking (ICOIN), IEEE; 2013.Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringAmrita School of Engineering, Amrita Vishwa Vidyapeetham UniversityCoimbatoreIndia

Personalised recommendations