Mechanism of the Secure MAP Discovery in Hierarchical MIPv6

  • Jonghyoun Choi
  • Youngsong Mun
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3981)


The Hierarchical Mobile IPv6 (HMIPv6) has been proposed to accommodate frequent mobility of the Mobile Node and to reduce the signaling load. A Mobility Anchor Point is a router located in a network visited by the Mobile Node. The Mobile Node uses the Mobile Anchor Point as a local Home Agent. The absence of any protections between Mobile Node and Mobile Anchor Point may lead to malicious Mobile Nodes impersonating other legitimate ones or impersonating a Mobile Anchor Point. In this paper, we propose a mechanism of the secure Mobile Anchor Point discovery in HMIPv6. The performance analysis and the numerical results presented in this paper show that our proposal has superior performance to other methods.


Mobile Node Mapping Table Correspondent Node Mobility Anchor Point Security Association 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Johnson, D.B., Perkins, C.E.: Mobility support in IPv6. IETF RFC 3775 (June 2004)Google Scholar
  2. 2.
    Soliman, H., Castelluccia, C., El Malki, K.: Hierarchical Mobile IPv6 Mobility Management (HMIPv6), RFC 4140 (August 2005)Google Scholar
  3. 3.
    Kent, S., Atkinson, R.: IP Authentication Header, RFC 2402 (November 1998)Google Scholar
  4. 4.
    Pack, S., Choi, Y.: A study on performance of hierarchical mobile IPv6 in IP-based cellular networks. IEICE Transactions on Communications E87-B(3), 462–469 (2004)Google Scholar
  5. 5.
    Akyildiz, I.F., Wang, W.: A dynamic location management scheme for next-generation multitier PCS systems. IEEE Trans. Wireless Commun. 1(1), 178–189 (2002)CrossRefGoogle Scholar
  6. 6.
    Woo, M.: Performance analysis of mobile IP regional registration. IEICE Trans. Commun. E86-B(2), 472–478 (2003)MathSciNetGoogle Scholar
  7. 7.
    Zhang, X., Castellanos, J.G., Capbell, A.T.: P-MIP: Paging extensions for mobile IP. ACM Mobile Networks and Applications 7(2), 127–141 (2002)CrossRefGoogle Scholar
  8. 8.
    Caldera, J., de Niz, D., Nakagawa, J.: Performance Analysis of IPsec and IKE For Mobile IP on Wireless Environments,
  9. 9.
    Harkins, D., Carrel, D.: The Internet Key Exchange. IETF RFC 2409 (November 1998)Google Scholar
  10. 10.
    Choi, J., Mun, Y.: An Efficient Handoff Mechanism with Web Proxy MAP in Hierarchical Mobile IPv6. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 271–280. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Bao, F., Deng, R., Qiu, Y., Zhou, J.: A Scheme for the Security between Mobile Node and Mobility Anchor Point in Hierarchical Mobile IPv6. IETF Internet draft, draft-qiu-mipshop-mn-map-security-00.txt (work in progress) (October 2005)Google Scholar
  12. 12.
    Haddad, W., Krishnan, S.: Combining Cryptographically Generated Address and Crypto -Based Identifiers to Secure HMIPv6. IETF Internet draft, draft-haddad-mipshop-hmipv6-security-01 (work in progress) (October 2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jonghyoun Choi
    • 1
  • Youngsong Mun
    • 1
  1. 1.School of ComputingSoongsil UniversitySeoulKorea

Personalised recommendations