Abstract
Security protocols are the basis of many mobile communication systems, thus it is important to ensure protocol property correct. Using Protocol Composition Logic (PCL), this paper proves a Mobile IP (MIP) registration protocol that is based on certificateless public key signature without pairing between home agent and foreign agent, which minimizes the registration time and cost as well as improves the security compared with the identity-based and certificate-based registration protocol. Analysis and proof shows that the proposed protocol provides users security and authentications, moreover, the anonymity property is proved correct.
Similar content being viewed by others
Reference
D. Johnson, C. Perkins, and J. Arkko. Mobility support in IPv6. http://rfc.sunsite.dk/rfc/rfc3775.html, March 2008.
Wang Haitao and Zheng Shaoren. The security issues and countermeasures in mobile IP. International Conference on Info-tech and Info-net, Beijing, China, October 2001, Vol. 5, 122–127.
S. Jacobs. Mobile IP public key based authentication. http://www3.ietf.org/proceedings/99mar/slides/mobileip-key-99mar.pdf, March 2008.
S. Chung, and K. Chae. An efficient public key-based authenticaiton with mobile IP in e-commerce. Proceedings of the International Conference on Parallel and Distributed Systems, IEEE Press, New York, 2000, 2825–2831.
J. Zao, S. Kent, J. Gahm. A public key based secure Mobile IP. Wireless Networks. 5(1999)5, 373–390.
S. Zhang, G. Xu, Z. Hu, et al. A mobile IP authenticaiton protocol based on identitty. Journal of BUPT, 28(2005)3, 86–88 (in Chinese). 张胜, 徐国爱, 胡正明, 等. 基于身份公钥的移动IP认证方案. 北京邮电大学学报, 28(2005)3, 86–88.
Kwang Cheol Jeong, Hyunseung Choo, and Sang Yong Ha. ID-based secure session key exchange scheme to reduce registration delay with AAA in mobile IP networks. LNCS, 3515(2005), 510–518.
S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, November 2003, Vol. 2894, 452–473.
L. Dang, W. Kou, N. Dang, et al.. Mobile IP registration in certificateless public key. IET Information Security, 1(2007)4, 167–173.
G. Lowe. Some new attacks upon security protocols. Proceedings of 9th IEEE Computer Security Foudations Workshop, Kenmare, Ireland, Jun. 1996, 162–169.
A. Datta, A. Derek, J. C. Mitchell, et al.. A derivation system and compositional logic for security protocols. Journal of Computer Security, 13(2005)3, 423–482.
A. Datta, A. Derek, J. C. Mitchell, et al.. The impossibility of realizable ideal functionality. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.3547&rep=rep1&type=pdf, 2005.
A. Datta, A. Derek, J. C. Mitchell, et al.. Protocol composition logic. http://www.standford.edu/danup-am/ddnir-pcl06.pdf, 2006.
J. Baek, R. Safavi-Naini, and W. Susilo. Certificateless public key encryption without pairing. http://www.uow.edu.au/~wsusilo/clpkewp_bss_final.pdf, 2005.
M. J. Zhang, C. X. Pei, and L. J. Dang. Efficient mbile IP registration protocol in certificateless public key infrastructure without pairing. The 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, China, September 2009, 4648–4651.
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the National Natural Science Foundation of China (No. 60572147), State Key Laboratory Specific Foundation (ISN090307), and the 111 Project (B08038).
Communication author: Zhang Manjun, born in 1980, female, Ph.D. candidate.
About this article
Cite this article
Zhang, M., Pei, C. Proof of certificateless MIP registration protocol based on PCL. J. Electron.(China) 27, 273–278 (2010). https://doi.org/10.1007/s11767-010-0321-3
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11767-010-0321-3