Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, Australia pp 345-352 | Cite as
Security Enhancement on an Authentication Method for Proxy Mobile IPv6
Abstract
Proxy Mobile IPv6 (PMIPv6) is an emerging network-based localized mobility management scheme. Recently, Zhou, Zhang and Qin proposed an authentication method for PMIPv6. However, this paper shows that their scheme fails to achieve mutual authentication between the Mobile Node (MN) and network. It performs only unilateral authentication of the MN to network, and the MN has no information about the authenticity of the network, thus it is susceptible to network spoofing attack and malicious MAG attack. Then, an improved scheme is proposed to remedy these security flaws.
Keywords
authentication handover proxy mobile IPv6Preview
Unable to display preview. Download preview PDF.
References
- 1.Gundavelli, S., Leung, K., Devarapalli, V., Wichorus, Chowdhury, K., Patil, B.: Proxy mobile IPv6, IETF Internet Draft, deaft-ietf-netlmm-proxymip6-18.txt (May 2008)Google Scholar
- 2.Kong, K., Lee, W., Han, Y., Shin, M., You, H.: Mobility Management for All-IP Mobile Networks: Mobile IPv6 vs. Proxy Mobile IPv6. IEEE Wireless Communications 15(2), 36–45 (2008)CrossRefGoogle Scholar
- 3.Zhou, H., Zhang, H., Qin, Y.: An authentication method for proxy mobile IPv6 and performance analysis. Security and Communication Networks 2(5), 445–454 (2009)CrossRefGoogle Scholar
- 4.Elgoarany, K., Eltoweissy, M.: Security in Mobile Ipv6: A Survey. Information Security Tech. Report 12(1), 32–43 (2007)CrossRefGoogle Scholar
- 5.Vogt, C., Kempf, J.: Security threats to network-based localized mobility management (NetLMM). IETF RFC4832 (April 2007)Google Scholar
- 6.Lee, J., Lee, J., Chung, T.: Ticket-based Authentication Mechanism for Proxy Mobile IPv6 Environment. In: Proceedings of the Third International Conference on Systems and Networks Communications (ICSNC 2008), pp. 304–309. IEEE Computer Society (2008)Google Scholar
- 7.Kim, H., Oh, B.: Secure and low latency handoff scheme for proxy mobile IPv6. In: Proceedings of the International Conference on Mobile Technology, Applications & Systems (Mobility Conference 2008). ACM Press (September 2008)Google Scholar
- 8.Mun, Y., Kim, M., Kim, G.: Mutual Authentication Scheme in Proxy Mobile IP. In: Proceedings of International Conference on Computational Sciences and Its Applications, ICCSA 2008, pp. 65–72. IEEE Computer Society (2008)Google Scholar
- 9.Park, S., Lee, J., Chung, T.: Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2009. LNCS, vol. 5592, pp. 885–896. Springer, Heidelberg (2009)CrossRefGoogle Scholar
- 10.Lee, J., Chung, T.: A Traffic Analysis of Authentication Methods for Proxy Mobile IPv6. In: Proceedings of International Conference on Information Security and Assurance (ISA 2008), pp. 512–517. IEEE Computer Society (2008)Google Scholar
- 11.Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter base protocol. IETF RFC 3588 (September 2003)Google Scholar