Mechanism of the Secure MAP Discovery in Hierarchical MIPv6
The Hierarchical Mobile IPv6 (HMIPv6) has been proposed to accommodate frequent mobility of the Mobile Node and to reduce the signaling load. A Mobility Anchor Point is a router located in a network visited by the Mobile Node. The Mobile Node uses the Mobile Anchor Point as a local Home Agent. The absence of any protections between Mobile Node and Mobile Anchor Point may lead to malicious Mobile Nodes impersonating other legitimate ones or impersonating a Mobile Anchor Point. In this paper, we propose a mechanism of the secure Mobile Anchor Point discovery in HMIPv6. The performance analysis and the numerical results presented in this paper show that our proposal has superior performance to other methods.
KeywordsMobile Node Mapping Table Correspondent Node Mobility Anchor Point Security Association
Unable to display preview. Download preview PDF.
- 1.Johnson, D.B., Perkins, C.E.: Mobility support in IPv6. IETF RFC 3775 (June 2004)Google Scholar
- 2.Soliman, H., Castelluccia, C., El Malki, K.: Hierarchical Mobile IPv6 Mobility Management (HMIPv6), RFC 4140 (August 2005)Google Scholar
- 3.Kent, S., Atkinson, R.: IP Authentication Header, RFC 2402 (November 1998)Google Scholar
- 4.Pack, S., Choi, Y.: A study on performance of hierarchical mobile IPv6 in IP-based cellular networks. IEICE Transactions on Communications E87-B(3), 462–469 (2004)Google Scholar
- 8.Caldera, J., de Niz, D., Nakagawa, J.: Performance Analysis of IPsec and IKE For Mobile IP on Wireless Environments, http://www-2.cs.cmu.edu/~dionisio/personal-publications.html
- 9.Harkins, D., Carrel, D.: The Internet Key Exchange. IETF RFC 2409 (November 1998)Google Scholar
- 11.Bao, F., Deng, R., Qiu, Y., Zhou, J.: A Scheme for the Security between Mobile Node and Mobility Anchor Point in Hierarchical Mobile IPv6. IETF Internet draft, draft-qiu-mipshop-mn-map-security-00.txt (work in progress) (October 2005)Google Scholar
- 12.Haddad, W., Krishnan, S.: Combining Cryptographically Generated Address and Crypto -Based Identifiers to Secure HMIPv6. IETF Internet draft, draft-haddad-mipshop-hmipv6-security-01 (work in progress) (October 2005)Google Scholar