Abstract
Due to an increasing number of portable devices, a support for quality of service (QoS) and security becomes an main issue in Mobile IP networks. However Authentication, Authorization, and Accounting (AAA) protocol has inefficient authenticating procedures that limit its QoS. That is, a mobile node (MN) should be distributed new session keys whenever it performs a handoff. As computing power of mobile devices becomes greater, a key distribution using a symmetric key cannot guarantee the security. Hence, we employ an ID-based cryptography to intensify the security and when the MN moves to a new domain, a foreign agent (FA) reuses previous session keys encrypted by a public key for the fast handoff. Our proposed scheme reduces handoff delay and maintains high security by exchanging previous session keys between FAs. The performance results show that the proposed scheme reduces the latency up to about 63% compared to the previous ID-based AAA.
This work was supported in parts by Brain Korea 21 and the Ministry of Information and Communication in Republic of Korea. Dr. H. Choo is the corresponding author.
Chapter PDF
Similar content being viewed by others
References
Boyd, C.: Modern data encryption. Electronic and Communication Engineering Journal, 271–278 (October 1993)
Glass, S., Hiller, T., Jacobs, S., Perkins, C.: Mobile IP Authentication, Authorization, and Accounting Requirements, RFC2977 (2000)
Hess, A., Shafer, G.: Performance Evaluation of AAA/Mobile IP Authentication. In: Proceedings of 2nd Polish-German Teletraffic Symposium (PGTS 2002), Gdansk, Poland (September 2002)
Lee, B.-G., Choi, D.-H., Kim, H.-G., Sohn, S.-W., Park, K.-H.: Mobile IP and WLAN with AAA authentication protocol using identity based cryptography. In: ICT 2003 Proceedings, vol. 3, pp. 597–603 (February 2003)
McNair, J., Akyldiz, I.F., Bender, M.D.: An inter-system handoff technique for the IMT–2000 system. In: INFOCOM 2000, vol. 1, pp. 203–216 (March 2000)
Perkins, C.E.: IP Mobility Support, IETF RFC2002 (October 1996)
Perkins, C.E.: Mobile IP and Security Issue: an Overview. In: Proceedings of 1st IEEE Workshop on Internet Technologies and Services (1999)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 46–53. Springer, Heidelberg (1985)
Vollbrecht, J., Cahoun, P., Farrell, S., Gommans, L.: AAA Authorization Application Examples, RFC 2104 (February 1997)
Dai, W.: Last modified, July 13 (2003), http://www.eskimo.com/weidai/benchmarks.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeong, K.C., Choo, H., Ha, S.Y. (2005). ID-Based Secure Session Key Exchange Scheme to Reduce Registration Delay with AAA in Mobile IP Networks. In: Sunderam, V.S., van Albada, G.D., Sloot, P.M.A., Dongarra, J.J. (eds) Computational Science – ICCS 2005. ICCS 2005. Lecture Notes in Computer Science, vol 3515. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11428848_67
Download citation
DOI: https://doi.org/10.1007/11428848_67
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26043-1
Online ISBN: 978-3-540-32114-9
eBook Packages: Computer ScienceComputer Science (R0)