Abstract
Proxy Mobile IPv6 (PMIPv6) is a protocol for network-based mobility management. Without a proper protection mechanism of the signaling messages to be used for mobility support in PMIPv6, PMIPv6 is vulnerable to several security attacks such as Redirection, MITM (Man-In-The-Middle), and DoS (Denial of Service) attacks. In this paper, we point out some security problems of previous authentication scheme associated with PMIPv6, and also propose a new authentication scheme and key management scheme applicable to PMIPv6. In addition, it is also shown that the proposed one is more efficient and secure than the previous ones.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2011-0002734).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. RFC3775 (June 2004)
Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., Patil, B.: Proxy Mobile IPv6. RFC5213 (August 2008)
Koodli, R.: Fast Handovers for Mobile IPv6. RFC4068 (July 2005)
Yokota, H., Chowdhury, K., Koodli, R., Patil, B., Xia, F.: Fast Handovers for Proxy mobile IPv6. RFC 5949 (2010)
Web page of Krb Working Group, http://www.ietf.org/html.charters/krb-wg-charter.html
Aura, T., Roe, M., Arkko, J.: Security of Internet Location Management. In: Proc. of 18th Annual Computer Security Applications Conference, Las Vegas (December 2002)
Nikander, P., Arkko, J., Aura, T., Montenegro, G., Nordmark, E.: Mobile IP version 6 Route Optimization Security Design Background. RFC4225 (December 2005)
Nikander, P., Arkko, J., Aura, T., Montenegro, G., Nordmark, E.: Mobile IP version 6 Route Optimization Security Design Background. RFC4225 (December 2005)
Vogt, C.: Security Threats to Network-Based Localized Mobility Management (NETLMM). RFC 4832 (2007)
Laganier, J., Narayanan, S., McCann, P.: Interface between a Proxy MIPv6 Mobility Access Gateway and a Mobile Node. Internet Draft, draft-ietf-netlmm-mn-ar-if-03 (2008)
Zhou, H., Zhang, H., Qin, Y.: An Authentication Method for Proxy Mobile IPv6 and Performance Analysis. Security and Communication Networks 2, 445–454 (2009)
Ryu, S., Kim, G., Kim, B., Mun, Y.: A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication. In: Proc. of International Conference on Computational Sciences and Its Applications, ICCSA, pp. 47–51 (2008)
Lee, J., Lee, J., Chung, T.: Ticket-based Authentication Mechanism for Proxy Mobile IPv6 Environment. In: Proc. of Third International Conference on Systems and Networks Communications 2008, pp. 304–309 (October 2008)
Song, J., Ha, S.: One-time Key Authentication Protocol for PMIPv6. In: Proc. of Third 2008 International Conference on Convergence and Hybrid Information Technology, pp. 1150–1153 (November 2008)
Lee, J., Chung, T.: A Traffic Analysis of Authentication Methods for Proxy Mobile IPv6. In: Proc. of 2008 International Conference on Information Security and Assurance, pp. 512–517 (2008)
Wang, W., Akyildiz, I.F.: Intersystem Location Update and Paging Schemes for Multitier Wireless Networks. In: Proc. of International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 99–109 (August 2000)
Baek, S., Pack, S., Kwon, T., Choi, Y.: Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots. In: Proc. of IEEE/IFIP Annual Conference on Wireless on demand Network Systems and Services (WONS 2006), Les Menuires, France (January 2006)
Krawczyk, H., Bellare, M., Canetti, R.: HMAC:Keyed-Hashing for Message Authentication. RFC 2104 (Feburuary 1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kang, HS., Park, CS. (2012). An Authentication and Key Management Scheme for the Proxy Mobile IPv6. In: Lee, D.H., Yung, M. (eds) Information Security Applications. WISA 2012. Lecture Notes in Computer Science, vol 7690. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35416-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-35416-8_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35415-1
Online ISBN: 978-3-642-35416-8
eBook Packages: Computer ScienceComputer Science (R0)