Secure Authentication Protocol in Mobile IPv6 Networks

  • Jung Doo Koo
  • Jung Sook Koo
  • Dong Chun Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4253)


We propose new binding update protocol in Mobile IPv6. In our protocol, the home agent (HA) of each node creates Diffie-Hellman session key using middle key and safely transmits the middle key, cookie, etc via secure IPSec tunnel. These are used to generate secret keys in a mobile node (MN) and a correspondent node (CN). We present that the proposed protocol is satisfied with security requirements of key agreement protocol and shows the appropriate defense in existed attack scenarios.


Mobile Node Home Agent Message Authentication Code Mobile IPv6 Binding Update 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. RFC 3775 (June 2004)Google Scholar
  2. 2.
    Qiu, Y., Zhou, J., Bao, F.: Protecting All Traffic Channels in Mobile IPv6 Network. In: Conf. on the Wireless Communications and Networking (March 2004)Google Scholar
  3. 3.
    Nikander, P., Perkins, C.: Binding Authentication Key Establishment Protocol for Mobile IPv6. IETF  Internet Draft (July 2001)Google Scholar
  4. 4.
    Bradner, S., Mankin, A., Schiller, J.I.: A Framework for Purpose Built Keys (PBK). IETF Internet Draft (June 2003)Google Scholar
  5. 5.
    Mankin, A., Patil, B., Harkins, D., Nordmak, E., Nikander, P., Roberts, P., Narten, T.: Threat Models introduced by Mobile IPv6 and Requirements for Security in Mobile IPv6. IETF Internet Draft (May 2001)Google Scholar
  6. 6.
    Kaufman, C.: Internet Key Exchange (IKEv2) Protocol. IETF Internet Draft (September 2004)Google Scholar
  7. 7.
    Patel, A., Leng, K., Akhtar, H., Khalil, M.: Network Access Identifier Option for Mobile IPv6. IETF Internet Draft (July 2004)Google Scholar
  8. 8.
    Calhoun, P., Perkins, C.: Mobile IP Network Access Identifier Extension for IPv4. RFC 2290 (March 2000)Google Scholar
  9. 9.
    Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. RFC 2104 (February 1997)Google Scholar
  10. 10.
    Kern, P., Simson, W.: Photuris: Extended Schemes and Attributes. RFC 2523 (March 1999)Google Scholar
  11. 11.
    Wide Kame Project,

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jung Doo Koo
    • 1
  • Jung Sook Koo
    • 2
  • Dong Chun Lee
    • 3
  1. 1.Dept. of Computer Science and Eng.Hanyang Univ.Korea
  2. 2.Dept. of Information SecurityKyonggi Univ.Korea
  3. 3.School of Computer ScienceHowon Univ.Korea

Personalised recommendations