Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management"

نویسندگان

  • Mojtaba Alizadeh
  • Mohammad Hesam Tadayon
  • Kouichi Sakurai
  • Sabariah Baharun
  • Hiroaki Anada
  • Mazdak Zamani
  • Akram M. Zeki
  • Shehzad Ashraf Chaudhry
  • Muhammad Khurram Khan
چکیده

Proxy Mobile IPv6 (PMIPv6), a network-based mobility management protocol, has clearly different perceptions compared with host-based mobility management protocols. In PMIPv6, a mobile node (MN) is not involved in any mobility signaling as mobility service provisioning entities provide mobility services for the MN. This characteristic leads us to develop a new handover authentication scheme that satisfies certain security and performance requirements. In this paper, handover optimized ticket-based authentication (HOTA) is developed to enable an MN to securely reuse a credential issued by an authentication server (AS) when the MN performs handover authentication over different access networks. The proposed secure reuse of the credential reduces the handover latency while it simplifies a handover authentication procedure. Initial authentication and handover authentication procedures of HOTA are presented in detail and analyzed with a formal authentication analysis method, BAN Logic. Analytical models are also developed to evaluate the authentication and handover latencies, packet loss, and handover failure probability. The conducted numerical analysis corroborates that HOTA outperforms previously developed handover authentication schemes for PMIPv6. 2012 Elsevier Inc. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Augmenting Security with Ticket Based Algorithm in proxy mobile IPV6 networks

Network security provides the network with the authorization of access to data in a network, which is prohibited by the network administrator. Proxy Mobile IPv6 (PMIPv6) supports mobility management without the participation of mobile nodes it support mobility management in any mobility-related signaling. In comparison with other existing methods, PMIPv6 has decreased signaling overhead and the...

متن کامل

Enhanced Authentication Scheme for Proxy Mobile IPv 6

Mobility management protocols play a vital role during mobile node transmission. That’s why IETF NETLMM working group has recently presented a new approach, i-e, Proxy Mobile IPv6 (PMIPv6) which is a network-based mobility management protocol. But, PMIPv6 still suffers from the long authentication latency during the handover process. In order to improve the performance of Proxy Mobile IPv6, Hyu...

متن کامل

Denial of Service Protection for Optimized and QoS-aware Handover Based on Localized Cookies

Quality of Service (QoS) mechanisms in networks supporting mobile Internet communications give rise to new threats: these mechanisms could be abused by malicious entities launching so-called Denial of Service (DoS) attacks. If the network can not efficiently check the credibility of a QoS-request during a handover process, malicious entities could flood the network with bogus QoSrequests; if th...

متن کامل

Performance analysis of a Denial of Service protection scheme for optimized and QoS-aware handover

Quality of Service (QoS) mechanisms in networks supporting mobile Internet communications give rise to Denial of Service (DoS) threats: if the network cannot efficiently check the credibility of a QoS request during a handover process, malicious entities could flood the network with bogus QoS requests; if the authentication check is performed by means of an AAA protocol before the access networ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013