Skip to main content

An Efficient Anonymous Registration Scheme for Mobile IPv4

  • Conference paper
Computational Intelligence and Security (CIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4456))

Included in the following conference series:

  • 966 Accesses

Abstract

With the develop of wireless networks, user anonymity are of growing concern. A key problem in the anonymous Mobile IP registration is how to minimize the registration delay while improve the security. This paper solves this problem by the non-interactive authentication from pairings in the identity-based cryptography. The main idea behind our scheme is to minimize both the on-line pairing operation time and the inter-domain communication round trip time based on the dynamic one-way authentication key. Analysis shows that the registration delay is reduced to 39.2001mswhile the improved security attributes including mutual tri-partite authentication, local key generation, stolen-verifier attacker and user privacy are provided in our scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. RFC,: IP Mobility Support (IPv4) (2002), http://www.ietf.org/rfc/rfc2002.txt

  2. Wang, H., Zheng, S.: The security issues and countermeasures in Mobile IP. In: Proceedings of, International Conferences on Info-tech and Info-net (ICII 2001), pp. 122–127. IEEE, New York (2001)

    Chapter  Google Scholar 

  3. Ateniese, G., Herzberg, A., Krawczyk, H., Tsudik, G.: Untraceable Mobility or How to Travel Incognito. Comput. Netw 8, 871–884 (1999)

    Article  Google Scholar 

  4. Jacobs, S.: Mobile IP Public Key Based Authentication, Internet Draft, draft-jacobs-mobileip-pki-auth-00.txt, Work in progress (1998)

    Google Scholar 

  5. Chung, S., Chae, K.: An Efficient Public Key-based Authenticaiton with Mobile IP in E-Commerce. In: Proceedings of the International Conference on Parallel and Distributed Systems, IEEE Press, New York (2000)

    Google Scholar 

  6. Lam, S.: Mobile-IP Registration Protocol: A Security Attack and New Secure Minimal Pubic-key Based Authentication. In: Proceedings of the 1999 International Symposium on Parallel Architectures, IEEE, New York (1999)

    Google Scholar 

  7. Wang, L., Yang, B.: A Timestamp Based Registration Protocol in Mobile Ip. Journal of Xidian Universiy 5, 777–780 (2004)

    Google Scholar 

  8. Zhang, S., Xu, G., Hu, Z., Yang, Y., Zhou, X.: A Mobile IP Authenticaiton Protocol Based on Identitty. Journal of BUPT 3, 86–88 (2005)

    Google Scholar 

  9. Zao, J., Kent, S., Gahm, Joshua: A publickey based secure Mobile IP. Wireless Networks 5, 373–390 (1999)

    Article  Google Scholar 

  10. Chou, C., Min, S., Jian, W., et al.: A Solution to Mobile IP Registration for AAA. In: Proceedings of 7th CDMA International Conference, IEEE, Seoul (2002)

    Google Scholar 

  11. Kwang, C.: ID-Based Secure Session Key Exchange Scheme to Reduce Registration Delay with AAA in Mobile IP Networks. In: Sunderam, V.S., van Albada, G.D., Sloot, P.M.A., Dongarra, J.J. (eds.) ICCS 2005. LNCS, vol. 3515, pp. 510–518. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–C229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  13. Sakai, R., Ohgishi, K. and Kasahara, M.: Cryptosystems based on pairing. In: The 2000 Sympoium on Cryptography and Information Security (2000)

    Google Scholar 

  14. Shamir, A.: Identity-base cryptosystems and signature schemes. In: Proc. of Crypto 1984, Springer, Heidelberg (1985)

    Google Scholar 

  15. Hess, A., Shafer, G.: Performance Evaluation of AAA/Mobile IP Authentication. In: Proceedings of 2nd Polish-German Teletraffic Symposium, Gdansk, Springer, Heidelberg (2002)

    Google Scholar 

  16. McNair, J., Akyldiz, I.F., Bender, M.D.: An inter-system handoff technique for the IMT-2000 system. In: INFOCOM 2000, IEEE, New York (2000)

    Google Scholar 

  17. Paulo, S. L. M., Barreto.: Efficient Pairing Computation on Supersingular Abelian Varieties. In: Cryptography ePrint Archive, Report (2004), http://eprint.iacr.org/2004/375.pdf

  18. Wei, D.: http://www.eskimo.com/~weidai/benchmarks.html

  19. Bertoni, G.M., Chen, L. Harrison, K.A. Pelosi, G.: Computing Tate pairing on smart cards. http://www.st.com/stonline/products/families/smartcard/ches2005v4

  20. Patroklos, G.: Performance Analysis of Cryptographic Protocols on Handheld Devices (2003), https://www.cs.tcd.ie/publications/techreports/reports.03/TCD-CS-2003-46.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cao, X., Kou, W., Li, H., Xu, J. (2007). An Efficient Anonymous Registration Scheme for Mobile IPv4. In: Wang, Y., Cheung, Ym., Liu, H. (eds) Computational Intelligence and Security. CIS 2006. Lecture Notes in Computer Science(), vol 4456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74377-4_79

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74377-4_79

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74376-7

  • Online ISBN: 978-3-540-74377-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics