Efficient Unilateral Authentication Mechanism for MIPv6
We present a unilateral authentication protocol for protecting IPv6 networks against abuse of mobile IPv6 primitives. The proposed protocol imposes minimal computational requirements on mobile nodes, uses as few messages as possible. It is also easy to implement, economic to deploy and lightweight in use. We formally verifies the correctness of the protocol using the finite-state analysis tool mur φ, which has been used previously to analyze hardware designs and security properties of several protocols.
KeywordsMobile Node Elliptic Curve Shared Secret Home Agent Correspondent Node
- 2.Le, F., Faccin, S.M.: Dynamic Diffie Helman based Key Distribution for Mobile IPv6. Internet Draft (April 2001)Google Scholar
- 3.Bradner, S., Mankin, A., Schiller, J.I.: A framework for purpose Built Keys(PBK). Internet Draft (February 2001)Google Scholar
- 4.Krawczyk, H., Bellare, M., Canetti, R.: HMAC:Keyed-Hashing for Mesage Authentication. RFC 2104 (February 1997)Google Scholar
- 5.Dill, D.: The Mur φ Verification System. In: Proc. 8th International Conference on Computer Aided Verification, pp. 390–393 (1996)Google Scholar