Secure authentication in heterogeneous wireless networks
Mobile Information Systems - Mobile Systems and Applications
Performance evaluation with different mobility models for dynamic probabilistic flooding in MANETs
Mobile Information Systems - Advances in Wireless Networks
Performance Metrics for IEEE 802.21 Media Independent Handover (MIH) Signaling
Wireless Personal Communications: An International Journal
Secure handover for Proxy Mobile IPv6 in next-generation communications: scenarios and performance
Wireless Communications & Mobile Computing
An overview of IEEE 802.21: media-independent handover services
IEEE Wireless Communications
An Analytical Framework for Performance Evaluation of IPv6-Based mobility Management Protocols
IEEE Transactions on Wireless Communications
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Enhancing MISP with Fast Mobile IPv6 Security
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Comprehensive protection of data-partitioned video for broadband wireless IPTV streaming
Mobile Information Systems
A methodology to counter DoS attacks in mobile IP communication
Mobile Information Systems
Flexible multi-authority attribute-based signature schemes for expressive policy
Mobile Information Systems - Advances in Network-Based Information Systems
Hi-index | 0.00 |
Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.