A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 Networks

  • Jung Doo Koo
  • Jungsook Koo
  • Dong Chun Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4097)


We propose a new authentication scheme of binding update protocol, which its Correspondent Node (CN) issues a ticket to Mobile Node (MN) when MN first executes the Binding Update (BU). This ticket assist that it is able to do efficiently the BU whenever MN requires the BU for the future. The proposed protocol need not be repeated equal BU course whenever the MN moves to foreign link or network, and is able to be executed in environment of not operating the Home Agent (HA), and also easies scalability.


Mobile Node Authentication Scheme Mobile Host Home Agent Mutual Authentication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Johnshon, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. IETF RFC 3775 (2004)Google Scholar
  2. 2.
    Nikander, P., Arkko, J., Aura, T., Montenegro, G., Nordmark, E.: Mobile IP Version 6 Route Optimization Security Design Background. IETF RFC 4225 (December 2005)Google Scholar
  3. 3.
    Kent, S., Atkinson, R.: IP Authentication Header. IETF RFC 2402 (November 1998)Google Scholar
  4. 4.
    Kent, S., Atkinson, R.: IP Encapsulating Security Payload (ESP). IETF RFC 2406 (November 1998)Google Scholar
  5. 5.
    Arkko, J., Devarapalli, V., Dupont, F.: Using IPsec to Protect Mobile IPv6 Signal-ing Between Mobile Nodes and Home Agents. IETF RFC 3776 (June 2004)Google Scholar
  6. 6.
    Harkins, D., Carrel, D.: The Internet Key Exchange (IKE). IETF RFC 2409 (1998)Google Scholar
  7. 7.
    O’Shea, G., Roe, M.: Child-proof Authentication for MIPv6 (CAM). ACM Computer Communications Review 31, 4–8 (2001)CrossRefGoogle Scholar
  8. 8.
    Aura, T.: Cryptographically Generated Addresses (CGAs). IETF RFC 3972 (2005)Google Scholar
  9. 9.
    Montenegro, G., Castelluccia, C.: Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Address. In: ISOC Symposium on Network and Distrib-uted System Security (NDSS 2002) (February 2002)Google Scholar
  10. 10.
    Montenegro, G., Castelluccia, C.: Crypto-Based Identifiers (CBID): Concepts and Application. ACM Transaction on Information and System Security 7, 97–127 (2004)CrossRefGoogle Scholar
  11. 11.
    Deng, R., Zhou, J., Bao, F.: Defending against Redirect Attack in Mobile IP. In: Proc. of the 9th ACM Conference on Computer and Communications Security, Washington D.C (November 2002)Google Scholar
  12. 12.
    Qiu, Y., Zhou, J., Bao, F.: Protecting All Traffic Channels in Mobile IPv6 Networks. In: Proceeding of WCNC 2004, March 2004, vol. 1, pp. 160–165 (2004)Google Scholar
  13. 13.
    Thomson, S., Narten, T.: IPv6 Stateless Address Auto-configuration. IETF RFC 2462 (December 1998)Google Scholar
  14. 14.
    Droms, R.: Dynamic Host Configuration Protocol (DHCP). IETF RFC 2131 (March 1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jung Doo Koo
    • 1
  • Jungsook Koo
    • 2
  • Dong Chun Lee
    • 3
  1. 1.Dept. of Computer Science and Eng.Hanyang Univ.Korea
  2. 2.Dept. of Information SecurityKyonggi Univ.Korea
  3. 3.Dept.of Computer ScienceHowon Univ.Korea

Personalised recommendations