A Secure and Efficient Binding Update Scheme with Decentralized Design for Next Generation IP Mobility

  • Senthil Kumar Mathi
  • M. L. Valarmathi
  • Srilakshmy
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 324)


Mobile Internet Protocol version 6 (MIPv6) maintains convergence for communication of mobile technologies with the ability to change their IP address. In MIPv6, a mobile device transmits location update messages which informs the current care-of address to its home agent indirectly, or to correspondent node directly, is termed as binding update. Security issues in MIPv6 are of vital significance, and the binding update messages must be secured against any malicious attacks that might attempt to get unauthorized access from the participating entities. This paper improves binding update scheme using optimal asymmetric encryption, which enhances security without relying on a third party. The proposed scheme achieves mutual authentication between the communicants and significant reduction in computational cost. The scheme is simulated and validated using the security tool AVISPA. Also, mitigation for various malicious attacks, such as replay attack, man-in-the-middle attack, and false binding update attack, have been addressed.


Binding update Route optimization Cryptographically generated address Mutual authentication Optimal asymmetric encryption 


  1. 1.
    K. Elgoarany, M. Eltoweissy, Security in mobile IPv6.: a survey. Inf. Secur. Tech. Rep. 12(1), 32–43 (2007)CrossRefGoogle Scholar
  2. 2.
    J. Guan, I. You, C. Xu, H. Zhou, H. Zhang, Survey on route optimization schemes for proxy mobile IPv6, in 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE (2012), pp. 541–546Google Scholar
  3. 3.
    H. Modares, A. Moravejosharieh, J. Lloret, R. Salleh, A survey of secure protocols in mobile IPv6. J. Netw. Comput. Appl. (2013)Google Scholar
  4. 4.
    S.K. Mathi, M.L. Valarmathi, A secure and decentralized registration scheme for IPv6 network-based mobility. Int. J. Eng. Technol. 5(5) (2013)Google Scholar
  5. 5.
    W.A.A. Alsalihy, M.S.S. Alsayfi, Integrating identity-based encryption in the return routability protocol to enhance signal security in mobile IPv6. Wirel. Pers. Commun. 68(3), 655–669 (2013)CrossRefGoogle Scholar
  6. 6.
    H. Modares, R. Salleh, A. Moravejosharieh, H. Malakootikhah, Securing binding update in mobile IPv6 using private key base binding update protocol (2012)Google Scholar
  7. 7.
    L.Y. Yeh, C.C. Yang, J.G. Chang, Y.L. Tsai, A secure and efficient batch binding update scheme for route optimization of nested network mobility in VANETs. J. Netw. Comput. Appl. 36(1), 284–292 (2013)CrossRefGoogle Scholar
  8. 8.
    J. Liu, J. Li, A novel key exchange protocol based on RSA-OAEP, in 10th International Conference on Advanced Communication Technology, ICACT 2008 (2008), p. 3Google Scholar
  9. 9.
    S. Qadir, M.U. Siddiqi, Cryptographically generated addresses (CGAs): a survey and an analysis of performance for use in mobile environment. IJCSNS Int. J. Comput. Sci. Netw. Secur. 11(2), 24–31 (2011)Google Scholar
  10. 10.
    C. Castellucia, G. Montenegro, Securing group management in IPv6 with cryptographically generated addresses, in 8thIEEE International Symposium Computers and Communication (2003), pp. 588–593Google Scholar
  11. 11.
    S. Sehwa, C. Hyoung-Kee, K. Jung-Yoon, A secure and lightweight approach for routing optimization in mobile IPv6. EURASIP J. Wirel. Commun. Netw. (2009)Google Scholar
  12. 12.
    Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In Computer Aided Verification. (2005) 281-285Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Senthil Kumar Mathi
    • 1
  • M. L. Valarmathi
    • 2
  • Srilakshmy
    • 1
  1. 1.Department of Computer Science and EngineeringAmrita School of Engineering, Amrita Vishwa Vidyapeetham UniversityCoimbatoreIndia
  2. 2.Department of Computer Science and EngineeringGovernment College of TechnologyCoimbatoreIndia

Personalised recommendations