Security and Privacy Criteria to Evaluate Authentication Mechanisms in Proxy Mobile IPv6

Authors

  • Mojtaba Alizadeh Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia
  • Mazdak Zamani Advanced Informatics School, Universiti Teknologi Malaysia, Federal Territory, 54100 Kuala Lumpur, Malaysia
  • Sabariah Baharun Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia
  • Wan Haslina Hassan Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia
  • Touraj Khodadadi Malaysia-Japan International Institute of Technology, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia

DOI:

https://doi.org/10.11113/jt.v72.3935

Abstract

Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this protocol, all mobility signaling procedures are completed by network entity not mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure has a key role to protect the network against different security threats; however, the details of authentication procedure is not specified in this standard. In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. The existing authentication approaches can be analyzed based on these criteria to find security issues.

References

Soto, I., Bernardos, C. J., Calderón, M., and Melia, T. 2010. PMIPv6: A Network-based Localized Mobility Management Solution. The Internet Protocol Journal. 13(3) 2–15.

Johnson, D., Perkins, C., andArkko, J. 2004. RFC 3775: Mobility support in IPv6. IETF.

Mphil, N. G., and Sc, N. R. M. 2014. A Survey on Mobility Management Protocols for Improving Handover Performance. 10(1): 53–57.

Soliman, H., Bellier, L., Elmalki, K., and Castelluccia, C. 2008. Hierarchical Mobile IPv6 (HMIPv6) Mobility Management.

Koodli, R. 2009. Mobile IPv6 Fast Handovers.

Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., Patil, B., andLeung, K. 2008. Proxy Mobile IPv6. 1–92.

Ki-Sik, K., Wonjun, L., Youn-Hee, H., Myung-Ki, S., and Heung Ryeol, Y. 2008. Mobility Management for all-IP Mobile Networks: Mobile IPv6 vs. Proxy Mobile IPv6. Wireless Communications, IEEE. 15(2): 36–45.

Modares, H., Moravejosharieh, A., Lloret, J., and Salleh, R. B. 2014. A Survey on Proxy Mobile IPv6 Handover.

Jiang, Q., Ma, J., Li, G., and Ye, A. 2012. Security Enhancement on an Authentication Method for Proxy Mobile IPv6. In L. Jiang (Ed.). Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, AustraliaSpringer Berlin Heidelberg. 110: 345–352.

Modares, H., Moravejosharieh, A., Lloret, J., and Salleh, R. 2014. A Survey of Secure Protocols in Mobile IPv6. Journal of Network and Computer Applications. 39(0): 351–368.

You, I. 2012. Design and Analysis of Mobile Internet Security Protocol by Using Formal Verification Methodology. (Ph.D ), Kyushu University, Japan.

Hsiang, H.-C., andShih, W.-K. 2009. Improvement of the Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment. Computer Standards & Interfaces. 31(6): 1118–1123.

Liao, Y.-P., and Wang, S.-S. 2009. A Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment. Computer Standards & Interfaces. 31(1): 24–29.

Das, M. L., Saxena, A., andGulati, V. P. 2004. A Dynamic ID-based Remote User Authentication Scheme. Consumer Electronics, IEEE Transactions on. 50(2): 629–631.

Taha, S., and Xuemin, S. 2011, 5-9 Dec. 2011. Anonymous Home Binding Update Scheme for Mobile IPv6 Wireless Networking. Paper presented at the Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE.

Truong, T.-T., Tran, M., and Duong, A.-D. 2012. Robust Mobile Device Integration of a Fingerprint Biometric Remote Authentication Scheme. Paper presented at the 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012, March 26, 2012–March 29, 2012, Fukuoka, Japan.

Joong-Hee, L., Jong-Hyouk, L., and Tai-Myoung, C. 2008. Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Environment. Paper presented at the Systems and Networks Communications, 2008. ICSNC '08. 3rd International Conference on. 26–31 Oct. 2008.

Debiao, H., Jianhua, C., and Jin, H. 2012. An ID-based Client Authentication with Key Agreement Protocol for Mobile client–server Environment on ECC with Provable Security. Information Fusion, 13(3): 223–230.

Zubair, M., Kong, X., Mahfooz, S., andJamshed, I. 2014. SIDP: A Secure Inter-Domain Distributed PMIPv6. International Journal of Information and Electronics Engineering. 4(2): 103–110.

Tsai, J.-L., Lo, N.-W., and Wu, T.-C. 2012. Secure Anonymous Authentication Protocol with Unlinkability for Mobile Wireless Environment. Paper presented at the 2012 International Conference on Anti-Counterfeiting, Security and Identification, ASID 2012, August 24, 2012–August 26, 2012, Taipei, Taiwan.

Haddad, W., Krishnan, S., Dupont, F., Bagnulo, M., andTschofenig, H. 2006. An Anonymity and Unlinkability Extension for OMIPv6. Work in Progress, Draft-haddadprivacy-omipv6-anonymity-01.

Tuncer, H., Mishra, S., andShenoy, N. 2012. A Survey of Identity and Handoff Management Approaches for the Future Internet. Computer Communications. 36(1): 63–79.

Yoon, E.-J., Choi, S.-B., andYoo, K.-Y. 2012. A Secure And Efficiency ID-based Authenticated Key Agreement Scheme Based on Elliptic Curve Cryptosystem for Mobile Devices. International Journal of Innovative Computing, Information and Control. 8(4): 2637–2653.

Hassan, M. M., and Hoong, P. K. 2011. One-time Key and Diameter Message Authentication Protocol for Proxy Mobile IPv6. International Journal of New Computer Architectures and their Applications (IJNCAA). 1(3): 624–639.

Kempf, J., and Vogt, C. 2007. Security Threats to Network-Based Localized Mobility Management (NETLMM).

Zubair, M., Kong, X., andMahfooz, S. 2014. CLAM: Cross-layer Localized Authentication Mechanism based on Proxy MIPv6 and SIP in Next Generation Networks. Journal of Communications. 9(2): 144–156.

Ming-Chin, C., Jeng-Farn, L., and Meng-Chang, C. 2013. SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks. Systems Journal, IEEE. 7(1): 102–113.

Barbudhe, V. K., andBarbudhe, A. K. 2013. Mobile IPv6: Threats and Solution. International Journal of Application or Innovation in Engineering & Management (IJAIEM). 2(6): 265–268.

Im, I., and Jeong, J. 2012. Security-Effective Local-Lighted Authentication Mechanism in NEMO-based Fast Proxy Mobile IPv6 Networks. International Journal of Digital Information and Wireless Communications (IJDIWC). 2(1): 86–103.

Downloads

Published

2015-01-11

How to Cite

Security and Privacy Criteria to Evaluate Authentication Mechanisms in Proxy Mobile IPv6. (2015). Jurnal Teknologi (Sciences & Engineering), 72(5). https://doi.org/10.11113/jt.v72.3935