Skip to main content

Mechanism of Authenticating a MAP in Hierarchical MIPv6

  • Conference paper
Advances in Grid and Pervasive Computing (GPC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3947))

Included in the following conference series:

  • 513 Accesses

Abstract

In Mobile IPv6, when a Mobile Node (MN) moves from home network to the foreign network, it configures a new Care-of-Address (CoA) and requests the Home Agent (HA) to update its binding. This binding process requires high signaling load. Thus, Hierarchical Mobile IPv6 (HMIPv6) has been proposed to accommodate frequent mobility of the MN and reduce the signaling load in the Internet. A Mobility Anchor Point (MAP) is a router located in a network visited by the MN. The MN uses the MAP as a local HA. The absence of any protections between MN and MAP may lead to malicious MNs impersonating other legitimate ones, impersonating a MAP. In this paper, we propose a mechanism of authenticating MAP and MN in HMIPv6. The performance analysis and the numerical results presented in this paper show that our proposal has almost same as the performance of the HMIPv6 without security in spite of security process load.

This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Johnson, D.B., Perkins, C.E.: Mobility support in IPv6. IETF RFC 3775 (June 2004)

    Google Scholar 

  2. Soliman, H., Castelluccia, C., El-Malki, K., Bellier, L.: Hierarchical MIPv6 mobility management. IETF Internet draft, draft-ietf-mipshop-hmipv6-04.txt (work in progress) (December 2004)

    Google Scholar 

  3. IETF MIPv6 Signaling and Handoff Optimization (mipshop) WG, http://www.ietf.org/html.charters/mipshop-charter.html

  4. Pack, S., Choi, Y.: A study on performance of hierarchical mobile IPv6 in IP-based cellular networks. IEICE Transactions on Communications E87-B(3), 462–469 (2004)

    Google Scholar 

  5. Akyildiz, I.F., Wang, W.: A dynamic location management scheme for next-generation multitier PCS systems. IEEE Trans. Wireless Commun. 1(1), 178–189 (2002)

    Article  Google Scholar 

  6. Woo, M.: Performance analysis of mobile IP regional registration. IEICE Trans. Commun. E86-B(2), 472–478 (2003)

    Google Scholar 

  7. Zhang, X., Castellanos, J.G., Capbell, A.T.: P-MIP: Paging extensions for mobile IP. ACM Mobile Networks and Applications 7(2), 127–141 (2002)

    Article  Google Scholar 

  8. choi, J., Mun, Y.: An Efficient Handoff Mechanism with Web Proxy MAP in Hierarchical Mobile IPv6. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3480, pp. 271–280. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, J., Mun, Y. (2006). Mechanism of Authenticating a MAP in Hierarchical MIPv6. In: Chung, YC., Moreira, J.E. (eds) Advances in Grid and Pervasive Computing. GPC 2006. Lecture Notes in Computer Science, vol 3947. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11745693_57

Download citation

  • DOI: https://doi.org/10.1007/11745693_57

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33809-3

  • Online ISBN: 978-3-540-33810-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics