Skip to main content

Secure Authentication Protocol in Mobile IPv6 Networks

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2006)

Abstract

We propose new binding update protocol in Mobile IPv6. In our protocol, the home agent (HA) of each node creates Diffie-Hellman session key using middle key and safely transmits the middle key, cookie, etc via secure IPSec tunnel. These are used to generate secret keys in a mobile node (MN) and a correspondent node (CN). We present that the proposed protocol is satisfied with security requirements of key agreement protocol and shows the appropriate defense in existed attack scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. RFC 3775 (June 2004)

    Google Scholar 

  2. Qiu, Y., Zhou, J., Bao, F.: Protecting All Traffic Channels in Mobile IPv6 Network. In: Conf. on the Wireless Communications and Networking (March 2004)

    Google Scholar 

  3. Nikander, P., Perkins, C.: Binding Authentication Key Establishment Protocol for Mobile IPv6. IETF  Internet Draft (July 2001)

    Google Scholar 

  4. Bradner, S., Mankin, A., Schiller, J.I.: A Framework for Purpose Built Keys (PBK). IETF Internet Draft (June 2003)

    Google Scholar 

  5. Mankin, A., Patil, B., Harkins, D., Nordmak, E., Nikander, P., Roberts, P., Narten, T.: Threat Models introduced by Mobile IPv6 and Requirements for Security in Mobile IPv6. IETF Internet Draft (May 2001)

    Google Scholar 

  6. Kaufman, C.: Internet Key Exchange (IKEv2) Protocol. IETF Internet Draft (September 2004)

    Google Scholar 

  7. Patel, A., Leng, K., Akhtar, H., Khalil, M.: Network Access Identifier Option for Mobile IPv6. IETF Internet Draft (July 2004)

    Google Scholar 

  8. Calhoun, P., Perkins, C.: Mobile IP Network Access Identifier Extension for IPv4. RFC 2290 (March 2000)

    Google Scholar 

  9. Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. RFC 2104 (February 1997)

    Google Scholar 

  10. Kern, P., Simson, W.: Photuris: Extended Schemes and Attributes. RFC 2523 (March 1999)

    Google Scholar 

  11. Wide Kame Project, http://www.kame.net

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Koo, J.D., Koo, J.S., Lee, D.C. (2006). Secure Authentication Protocol in Mobile IPv6 Networks. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4253. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893011_70

Download citation

  • DOI: https://doi.org/10.1007/11893011_70

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46542-3

  • Online ISBN: 978-3-540-46544-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics