A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates

نویسندگان

  • Il-Sun You
  • Kyungsan Cho
چکیده

In this paper, we propose a security proxy based protocol for authenticating the binding updates in Mobile IP Version 6 environment, which combines the Deng-Zhou-Bao¡s protocol [2] with Aura¡s two hash-based CGA scheme [8] to avoid the use of trusted CAs. The two hash-based CGA scheme enables our protocol to achieve stronger security than other CGA-based protocols without a trusted CA, resulting in less cost of verifying the HA¡s public key than the one of the Deng-Zhou-Bao¡s protocol. The comparison of our protocol with other protocols such as the Deng-Zhou-Bao¡s protocol, CAM-DH and SUCV shows that our protocol can provide good performance and manageability in addition to stronger security than one hash-based CGA approaches..

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Study of an Integrated Security Handover Scheme for Hierarchical Mobile IPv6 based Multimedia Convergence Networks

Hierarchical Mobile IPv6 introduces a new node called the Mobile Anchor Point (MAP) to improve the handover speed performance of Mobile IPv6 by reducing the amount of signaling in the ongoing connection between the mobile node, its correspondent nodes, and its home agent. With MAP as an additional node, it’s signaling, both received and sent is subject to several security vulnerabilities that n...

متن کامل

An Integrated Security Handover Scheme for Seamless Convergence Services over IP-based Mobile Networks

Mobile IPv6 is a network-layer solution to node mobility for the IPv6 Internet. It allows a mobile node to maintain a continuous connection from one access point to another. MIPv6 introduces several security vulnerabilities such as the authentication and authorization of Binding Updates (BUs) during the home agent registration process. This paper deals with securing the standard mobile IPv6 han...

متن کامل

Improved Security Mechanism for Mobile IPv6

Security is a critical design issue in Mobile IPv6 since adversaries can take advantage of its routing process and arbitrarily channelize the traffic to different destinations. The original security scheme, the return routability (RR) procedure, used in Mobile IPv6 route optimization does not protect against adversaries who are on the path between the home agent (HA) and the correspondent node ...

متن کامل

Dual Identity Return Routability for the Security of Mobile Ipv6 Binding Updates within the Distributed Authentication Protocol

The future fourth generation 4G networks will provide us with a paradigm shift in how mobile telecommunications will operate. It will be solely based on packet switching using mobile IPv6. However binding update route optimisation is vulnerable to a variety of security attacks. This paper attempts to reduce the security vulnerabilities by creating a new security protocol by first investigating ...

متن کامل

An Access Authentication Scheme Based on 2-HIBS in Proxy Mobile IPv6 Network

Proxy Mobile IPv6 is a network-based mobility management protocol. The access authentication security plays the primary role in maintaining network security of proxy mobile IPv6. In this paper, we constructed an authentication framework, which is suitable for proxy mobile IPv6 and has eliminated the interaction between the access network and the home network. We implemented a mutual authenticat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004