Abstract
Mobile IP proposed by IETF supports continuous services for a mobile node (MN) based on its capability to roam around foreign domains [1]. Recently the rapid growth of wireless technology and its use in coordination with the Internet require a very careful look at issues regarding the security. As a large portion of 785-million world Internet users access such technologies in the context of providing security demanded services, it is essential to recognize the potential threats in wireless technologies. For this reason, IETF suggests that the existence of some servers capable of performing the authentication, authorization, accounting (AAA) services could help [4, 5, 6, 7]. In this paper, we propose an Extended IDentification Key (EIDK) mechanism based on IDK with Authentication Value (AV) that can reduce the number of signaling messages and thus signaling delay for services even in handoffs while maintaining the similar level of security to the previous works [10, 11]. The performance results obtained show that this method can provides a good solution to secure service procedures in mobile computing.
This work was supported in parts by Brain Korea 21 and the Ministry of Information and Communication in Republic of Korea. Dr. H. Choo is the corresponding author.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Perkins, C.E.: IP Mobility Support. IETF RFC 2002
Perkins, C.: Mobile IP Joins Forces with AAA. IEEE Personal Communications 7(4), 59–61 (2000)
David, B., Perkins, C., Arkko, J.: Mobility Support in IPv6. IETF draft, Internet Draft draft-ietf-mobileip-ipv6-17.txt (May 2002)
Vollbrecht, J., Cahoun, P., Farrell, S., Gommans, L.: AAA Authorization Framework. RFC 2904 (2000)
Vollbrecht, J., Calhoun, P., Farrell, S., Gommans, L., Gross, G., debruijn, B., de Laat, C., Holdrege, M., Spence, D.: AAA Authorization Application Examples. IETF RFC 2905
Farrell, S., Vollbrecht, J., Calhoun, P., Gommans, L.: AAA Authorization Requirements. RFC 2906 (August 2000)
Glass, S., Hiller, T., Jacobs, S., Perkins, C.: Mobile IP Authentication, Authorization, and Accounting Requirements. RFC 2977 (2000)
Hasan, A., Jahnert, J., Zander, S., Stiller, B.: Authentication, Authorization, Accounting and Charging for the Mobile Internet. Mobile Summit (September 2001)
Hess, A., Schafer, G.: Performance Evaluation of AAA/Mobile IP Authentication. 2nd Polish-German Teletraffic (2002)
Kim, H., Choi, D., Kim, D.: Secure Session Key Exchange for Mobile IP Low Latency Handoffs. LNCS, vol. 2668, pp. 230–238. Springer, Heidelberg (2003)
Park, J., Bae, E., Pyeon, H., Chae, K.: A Ticket-based AAA Security Mechanism in Mobile IP Network. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol. 2668, pp. 210–219. Springer, Heidelberg (2003)
Jeon, H., Choo, H., Oh, J.: IDentification Key Based AAA Mechanism in Mobile IP Networks. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 765–775. Springer, Heidelberg (2004)
McNair, J., Akyildiz, I.F., BEnder, M.D.: An inter-system handoff technique for the IMT-2000 system. In: INFOCOM 2000, March 2000, vol. 1, pp. 203–216 (2000)
McNair, J., Akyildiz., I.F., Bender, M.D.: Handoffs for real-time traffic in mobile IP version 6 networks. In: GLOBECOM 2001, vol. 6, pp. 3463–3467. IEEE, Los Alamitos (2001)
Yang, C., Hwang, M., Li, J., Chang, T.: A Solution to Mobile IP Registration for AAA. In: Lee, J.-Y., Kang, C.-H. (eds.) CIC 2002. LNCS, vol. 2524, pp. 329–337. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeon, H., Chung, M.Y., Choo, H. (2005). On AAA with Extended IDK in Mobile IP Networks. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424758_55
Download citation
DOI: https://doi.org/10.1007/11424758_55
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25860-5
Online ISBN: 978-3-540-32043-2
eBook Packages: Computer ScienceComputer Science (R0)