Secure proxy MIPv6-based mobility solution for LPWAN

نویسندگان

چکیده

With the advancement and wide deployment of Internet Things, Low Power Wide Area Network (LPWAN) technologies will respond to applications requiring low power long range features. In this context, mobility is an additional requirement needed by several including supply chain monitoring health-care supervision. Proxy Mobile IPv6 (PMIPv6) as extension Protocol (IP) used in LPWAN protocol stack since it provides management. But PMIPv6 does not provide secure access for mobile nodes joining network. paper, we propose a new solution based on authentication mechanism achieve Thereafter, evaluate performance proposed simulation using Simulator 3 (NS-3) theoretical analysis. Moreover, security assessed informal analysis well AVISPA validation tool. Finally, compare our with other solutions where show improvements made respect parameters requirements.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Mobility in MIPv6 Considering Arrival Time

Mobile IPv6 represents a global solution, providing mobility management for a wide variety of radio technologies, devices, and applications. In particular, Network Mobility basic support protocol is the one of fundamental solutions in MIPv6 which reduces the number of binding update messages issued from mobile network nodes except mobile routers. That is, it never reduces the number of binding ...

متن کامل

Cross-Layer Mobility with SIP and MIPv6

Terminal mobility may be handled at different layers. Though the MIPv6 protocol is the strongest candidate for handling mobility in the next generation networks, mobility management facilities are also provided by SIP, the most widely deployed and researched protocol for session control. When jointly used, this duplication of functions leads to inefficiencies in session setup signaling, particu...

متن کامل

Two Secure Anonymous Proxy-based Data Storages

Unidirectional proxy re-encryption (PRE) can be used to realize an efficient and secure shared storage. However, this type of storage does not yet protect its users’ privacy: to retrieve some data a user must give his identity and his query to the proxy. We propose two secure data storage systems that allow authorized users to anonymously get access to the content of encrypted data on a storage...

متن کامل

Provably Secure Certificate-based Proxy Signature Schemes

In this paper, we first propose the definition and security model of certificate-based proxy signature (CBPS). We then show that the certificate-based proxy signature scheme presented by Kang, Park and Hahn in CT-RSA 2004 are insecure against key replacement attacks. We further propose two certificate-based proxy signature schemes, which are shown to be existentially unforgeable against adaptiv...

متن کامل

A Proxy-Based Architecture for Secure Networked Wearable Devices

We describe the software and hardware architecture for a wearable communicator, and a secure protocol for communication between it and its software proxy. The proxy runs on a fast computer so it is capable of implementing sophisticated cryptographic algorithms, while the wearable communicator contains a simple embedded processor capable of only simple algorithms. The architecture of the wearabl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Networks

سال: 2022

ISSN: ['1572-8196', '1022-0038']

DOI: https://doi.org/10.1007/s11276-022-03097-4