Skip to main content

Secure Authentication Protocol in Mobile IPv6 Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4253))

Abstract

We propose new binding update protocol in Mobile IPv6. In our protocol, the home agent (HA) of each node creates Diffie-Hellman session key using middle key and safely transmits the middle key, cookie, etc via secure IPSec tunnel. These are used to generate secret keys in a mobile node (MN) and a correspondent node (CN). We present that the proposed protocol is satisfied with security requirements of key agreement protocol and shows the appropriate defense in existed attack scenarios.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. RFC 3775 (June 2004)

    Google Scholar 

  2. Qiu, Y., Zhou, J., Bao, F.: Protecting All Traffic Channels in Mobile IPv6 Network. In: Conf. on the Wireless Communications and Networking (March 2004)

    Google Scholar 

  3. Nikander, P., Perkins, C.: Binding Authentication Key Establishment Protocol for Mobile IPv6. IETF  Internet Draft (July 2001)

    Google Scholar 

  4. Bradner, S., Mankin, A., Schiller, J.I.: A Framework for Purpose Built Keys (PBK). IETF Internet Draft (June 2003)

    Google Scholar 

  5. Mankin, A., Patil, B., Harkins, D., Nordmak, E., Nikander, P., Roberts, P., Narten, T.: Threat Models introduced by Mobile IPv6 and Requirements for Security in Mobile IPv6. IETF Internet Draft (May 2001)

    Google Scholar 

  6. Kaufman, C.: Internet Key Exchange (IKEv2) Protocol. IETF Internet Draft (September 2004)

    Google Scholar 

  7. Patel, A., Leng, K., Akhtar, H., Khalil, M.: Network Access Identifier Option for Mobile IPv6. IETF Internet Draft (July 2004)

    Google Scholar 

  8. Calhoun, P., Perkins, C.: Mobile IP Network Access Identifier Extension for IPv4. RFC 2290 (March 2000)

    Google Scholar 

  9. Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. RFC 2104 (February 1997)

    Google Scholar 

  10. Kern, P., Simson, W.: Photuris: Extended Schemes and Attributes. RFC 2523 (March 1999)

    Google Scholar 

  11. Wide Kame Project, http://www.kame.net

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Koo, J.D., Koo, J.S., Lee, D.C. (2006). Secure Authentication Protocol in Mobile IPv6 Networks. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4253. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11893011_70

Download citation

  • DOI: https://doi.org/10.1007/11893011_70

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46542-3

  • Online ISBN: 978-3-540-46544-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics