Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework
MDA '99 Proceedings of the First International Conference on Mobile Data Access
A survey on integrating MANETs with the Internet: Challenges and designs
Computer Communications
An Efficient Anonymous Registration Scheme for Mobile IPv4
Computational Intelligence and Security
Performance analysis of mobile IP registration protocols
WSEAS Transactions on Computers
Verification of Correspondence Assertions in a Calculus for Mobile Ad Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks
IEEE Transactions on Wireless Communications
Efficient mobile IP registration in certificateless public key infrastracture without pairing
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Secured macro/micro-mobility protocol for multi-hop cellular IP
Pervasive and Mobile Computing
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
A secure and efficient registration for IP mobility
Proceedings of the First International Conference on Security of Internet of Things
Hi-index | 0.00 |
The ubiquity of the Internet and explosive growth in wireless networking in recent years increasingly urge the demand to support mobility within the Internet, which is what Mobile IP aims to provide. This paper is concerned with the security aspect of the registration protocol in Mobile IP. In this paper, we show that despite the use of authenticated registration messages and replay protection, the current registration protocol suffers from a possible replay attack. The paper also analyzes a proposed extension of Mobile IP that aims to provide public-key based authentication. We show some drawbacks in its protocol design and then propose our own new secure authentication protocol that employs only minimal use of public key cryptography. Despite its practicality, our new protocol provides a scalable solution for authentication and non-repudiation, while sets only minimal computing and administration cost on the Mobile Node.