Design and Performance Analysis of Sensor Proxy-AAA Authentication Scheme Based on Fast Handover and Forwarding Mode for IP-based Internet of Things
نویسندگان
چکیده
Recen tly interest in Internet of Things(I oT) is increasing, and a variety of the security technol ogies tha t are suitable for Internet of Things has being studied. In order to main tain the trustw orth y connectivity and the accessibility of distributed IoT, it is importan t to establish secure links for endto-end comm unica tion with proper authen tica tion. AAA technol ogy is curren tly the best way of resol ving dela y issue when introd ucing authen tica tion process of mobile switching. How ever, there are still a number of issues among which the dela y time issue from authen tica tion and authoriza tion grea tly inf uences the process. AAA applica tion in mobile IP environmen t cannot f uen tly support continuous and fast handov er in both intra-domain and inter-domain. Mobile IPv6 (MIPv6) is a host -based protocol supporting gl obal mobility . On the other hand, Proxy Mobile IPv6 (PMIPv6) is a netw ork-based protocol supporting localized mobility . This paper , the additional cost from combina tion of PMIPv6, authen tica tion, authoriza tion and accoun ting (AAA) and the way of red ucing extended dela y time will be explained. First , a new authen tica tion scheme (Proxy -AAA) is proposed tha t supports forw arding mode and fast handov er mode betw een other local mobility anchors (LMAs). Second, configur cost anal ysis model based on Proxy -AAA. Based on theoretical anal ysis, it was confirme tha t the cost is affected by average arriv al rate and residence time. Receiv ed on 26 November 2016; accepted on 13 July 2017; published on 13 September 2017
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملThe Backward Fast Media Independent Handover for Proxy Mobile IPv6 Control Scheme (BFMIH-PMIPV6) over Heterogeneous Wireless Mobile Networks
Proxy Mobile IPv6 (PMIPv6) is a networked-based handover protocol for the IP layer, i.e., the layer 3 mobility management protocol. In this work, we integrated fast handover and IEEE 802.21 Media Independent Handover (MIH) Services with PMIPv6 to improve the handover performance over the heterogeneous wireless network environment. Since the handover performance of the predictive mode is better ...
متن کاملAn Optimized Scheme for Mobile IPv6 Handover Between Domains Based on AAA
When Mobile IPv6 is deployed in commercial network, a mobile node needs AAA services for authentication, authorization and accounting. AAA and Mobile IPv6 are operated independently. Hence schemes which merge these protocols have been emerged. These schemes enable the mobile node to establish a security association between the mobile node and a home agent, and to perform a home binding update d...
متن کاملSome observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)
Over the last years, the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. Security and efficiency could be the main challenges of that communication. On the other hand, authenticity and confidentiality are two important goals to provide desired security in an information system, including IoT-based applications. An Authentication an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- ICST Trans. Mobile Communications Applications
دوره 3 شماره
صفحات -
تاریخ انتشار 2017