Skip to main content

An Authentication and Key Management Scheme for the Proxy Mobile IPv6

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7690))

Abstract

Proxy Mobile IPv6 (PMIPv6) is a protocol for network-based mobility management. Without a proper protection mechanism of the signaling messages to be used for mobility support in PMIPv6, PMIPv6 is vulnerable to several security attacks such as Redirection, MITM (Man-In-The-Middle), and DoS (Denial of Service) attacks. In this paper, we point out some security problems of previous authentication scheme associated with PMIPv6, and also propose a new authentication scheme and key management scheme applicable to PMIPv6. In addition, it is also shown that the proposed one is more efficient and secure than the previous ones.

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2011-0002734).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. RFC3775 (June 2004)

    Google Scholar 

  2. Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., Patil, B.: Proxy Mobile IPv6. RFC5213 (August 2008)

    Google Scholar 

  3. Koodli, R.: Fast Handovers for Mobile IPv6. RFC4068 (July 2005)

    Google Scholar 

  4. Yokota, H., Chowdhury, K., Koodli, R., Patil, B., Xia, F.: Fast Handovers for Proxy mobile IPv6. RFC 5949 (2010)

    Google Scholar 

  5. Web page of Krb Working Group, http://www.ietf.org/html.charters/krb-wg-charter.html

  6. Aura, T., Roe, M., Arkko, J.: Security of Internet Location Management. In: Proc. of 18th Annual Computer Security Applications Conference, Las Vegas (December 2002)

    Google Scholar 

  7. Nikander, P., Arkko, J., Aura, T., Montenegro, G., Nordmark, E.: Mobile IP version 6 Route Optimization Security Design Background. RFC4225 (December 2005)

    Google Scholar 

  8. Nikander, P., Arkko, J., Aura, T., Montenegro, G., Nordmark, E.: Mobile IP version 6 Route Optimization Security Design Background. RFC4225 (December 2005)

    Google Scholar 

  9. Vogt, C.: Security Threats to Network-Based Localized Mobility Management (NETLMM). RFC 4832 (2007)

    Google Scholar 

  10. Laganier, J., Narayanan, S., McCann, P.: Interface between a Proxy MIPv6 Mobility Access Gateway and a Mobile Node. Internet Draft, draft-ietf-netlmm-mn-ar-if-03 (2008)

    Google Scholar 

  11. Zhou, H., Zhang, H., Qin, Y.: An Authentication Method for Proxy Mobile IPv6 and Performance Analysis. Security and Communication Networks 2, 445–454 (2009)

    Article  Google Scholar 

  12. Ryu, S., Kim, G., Kim, B., Mun, Y.: A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication. In: Proc. of International Conference on Computational Sciences and Its Applications, ICCSA, pp. 47–51 (2008)

    Google Scholar 

  13. Lee, J., Lee, J., Chung, T.: Ticket-based Authentication Mechanism for Proxy Mobile IPv6 Environment. In: Proc. of Third International Conference on Systems and Networks Communications 2008, pp. 304–309 (October 2008)

    Google Scholar 

  14. Song, J., Ha, S.: One-time Key Authentication Protocol for PMIPv6. In: Proc. of Third 2008 International Conference on Convergence and Hybrid Information Technology, pp. 1150–1153 (November 2008)

    Google Scholar 

  15. Lee, J., Chung, T.: A Traffic Analysis of Authentication Methods for Proxy Mobile IPv6. In: Proc. of 2008 International Conference on Information Security and Assurance, pp. 512–517 (2008)

    Google Scholar 

  16. Wang, W., Akyildiz, I.F.: Intersystem Location Update and Paging Schemes for Multitier Wireless Networks. In: Proc. of International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 99–109 (August 2000)

    Google Scholar 

  17. Baek, S., Pack, S., Kwon, T., Choi, Y.: Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots. In: Proc. of IEEE/IFIP Annual Conference on Wireless on demand Network Systems and Services (WONS 2006), Les Menuires, France (January 2006)

    Google Scholar 

  18. Krawczyk, H., Bellare, M., Canetti, R.: HMAC:Keyed-Hashing for Message Authentication. RFC 2104 (Feburuary 1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kang, HS., Park, CS. (2012). An Authentication and Key Management Scheme for the Proxy Mobile IPv6. In: Lee, D.H., Yung, M. (eds) Information Security Applications. WISA 2012. Lecture Notes in Computer Science, vol 7690. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35416-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35416-8_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35415-1

  • Online ISBN: 978-3-642-35416-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics