Security Enhancement on an Authentication Method for Proxy Mobile IPv6

  • Qi Jiang
  • Jianfeng Ma
  • Guangsong Li
  • Ayong Ye
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 110)

Abstract

Proxy Mobile IPv6 (PMIPv6) is an emerging network-based localized mobility management scheme. Recently, Zhou, Zhang and Qin proposed an authentication method for PMIPv6. However, this paper shows that their scheme fails to achieve mutual authentication between the Mobile Node (MN) and network. It performs only unilateral authentication of the MN to network, and the MN has no information about the authenticity of the network, thus it is susceptible to network spoofing attack and malicious MAG attack. Then, an improved scheme is proposed to remedy these security flaws.

Keywords

authentication handover proxy mobile IPv6 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gundavelli, S., Leung, K., Devarapalli, V., Wichorus, Chowdhury, K., Patil, B.: Proxy mobile IPv6, IETF Internet Draft, deaft-ietf-netlmm-proxymip6-18.txt (May 2008)Google Scholar
  2. 2.
    Kong, K., Lee, W., Han, Y., Shin, M., You, H.: Mobility Management for All-IP Mobile Networks: Mobile IPv6 vs. Proxy Mobile IPv6. IEEE Wireless Communications 15(2), 36–45 (2008)CrossRefGoogle Scholar
  3. 3.
    Zhou, H., Zhang, H., Qin, Y.: An authentication method for proxy mobile IPv6 and performance analysis. Security and Communication Networks 2(5), 445–454 (2009)CrossRefGoogle Scholar
  4. 4.
    Elgoarany, K., Eltoweissy, M.: Security in Mobile Ipv6: A Survey. Information Security Tech. Report 12(1), 32–43 (2007)CrossRefGoogle Scholar
  5. 5.
    Vogt, C., Kempf, J.: Security threats to network-based localized mobility management (NetLMM). IETF RFC4832 (April 2007)Google Scholar
  6. 6.
    Lee, J., Lee, J., Chung, T.: Ticket-based Authentication Mechanism for Proxy Mobile IPv6 Environment. In: Proceedings of the Third International Conference on Systems and Networks Communications (ICSNC 2008), pp. 304–309. IEEE Computer Society (2008)Google Scholar
  7. 7.
    Kim, H., Oh, B.: Secure and low latency handoff scheme for proxy mobile IPv6. In: Proceedings of the International Conference on Mobile Technology, Applications & Systems (Mobility Conference 2008). ACM Press (September 2008)Google Scholar
  8. 8.
    Mun, Y., Kim, M., Kim, G.: Mutual Authentication Scheme in Proxy Mobile IP. In: Proceedings of International Conference on Computational Sciences and Its Applications, ICCSA 2008, pp. 65–72. IEEE Computer Society (2008)Google Scholar
  9. 9.
    Park, S., Lee, J., Chung, T.: Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2009. LNCS, vol. 5592, pp. 885–896. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  10. 10.
    Lee, J., Chung, T.: A Traffic Analysis of Authentication Methods for Proxy Mobile IPv6. In: Proceedings of International Conference on Information Security and Assurance (ISA 2008), pp. 512–517. IEEE Computer Society (2008)Google Scholar
  11. 11.
    Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter base protocol. IETF RFC 3588 (September 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Qi Jiang
    • 1
  • Jianfeng Ma
    • 1
  • Guangsong Li
    • 2
  • Ayong Ye
    • 3
  1. 1.Key Laboratory of Computer Networks and Information Security (Ministry of Education)Xidian UniversityXi’anP.R. China
  2. 2.Department of Information ResearchZhengzhou Information Science and Technology InstituteZhengzhouP.R. China
  3. 3.Key Lab of Network Security and CryptologyFujian Normal UniversityFuzhouP.R. China

Personalised recommendations