Skip to main content

Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5592))

Abstract

In PMIPv6, it is possible to support mobility for IPv6 nodes without software stack to exchange the signaling messages to control its movement. EAP-TLS supports for certificate-based mutual authentication, utilizing the protected ciphersuite negotiation, mutual authentication and key management capabilities of the TLS protocol. In this paper, we describe a certificate-based public key authentication mechanism for Proxy Mobile IPv6 environments. The certificate-based authentication mechanism is based on EAP-TLS that supports the mutual authentication during its ciphersuit negotiation. The proposed certificate-based authentication mechanism that involves initial authentication and handoff authentication is analyzed by BAN logic.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6, RFC 3775 (June 2004)

    Google Scholar 

  2. Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., Patil, B.: Proxy Mobile IPv6, RFC 5213 (August 2008)

    Google Scholar 

  3. Lee, J.-H., Lim, H.-J., Chung, T.-M.: A competent global mobility support scheme in NETLMM. International Journal of Electronics and Communications, online published (August 2008), doi:10.1016/j.aeue.2008.07.010

    Google Scholar 

  4. Lee, J.-H., Chung, T.-M., Gundavelli, S.: A Comparative Signaling Cost Analysis of Hierarchical Mobile IPv6 and Proxy Mobile IPv6. In: Proceedings of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2008) (September 2008)

    Google Scholar 

  5. Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP), RFC 3748 (June 2004)

    Google Scholar 

  6. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.1, RFC 4346 (April 2006)

    Google Scholar 

  7. Simon, D., Aboba, B., Hurst, R.: The EAP-TLS Authentication Protocol, RFC 5216 (March 2008)

    Google Scholar 

  8. Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems 8, 18–36 (1990)

    Article  MATH  Google Scholar 

  9. Nakhjiri, M., Nakhjiri, M.: AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI, and IP Mobility. John Wiley & Sons Ltd., West Sussex (2005)

    Book  Google Scholar 

  10. Lee, J.-H., Han, B.-J., Chung, T.-M., Lim, H.-J.: Network Mobility Basic Support within Proxy Mobile IPv6: scenarios and analysis (September 2008), draft-jhlee-netlmm-nemo-scenarios-01

    Google Scholar 

  11. Gaarder, K., Snekkenes, E.: Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol. Journal of Cryptology 3(2), 81–98 (1991)

    Article  MATH  Google Scholar 

  12. Sufatrio, Yap, R.: Extending BAN Logic for Reasoning with Modern PKI-Based Protocols. In: IFIP International Conference on Network and Parallel Computing 2008, October 2008, pp. 190–197 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, SS., Lee, JH., Chung, TM. (2009). Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2009. ICCSA 2009. Lecture Notes in Computer Science, vol 5592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02454-2_69

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02454-2_69

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02453-5

  • Online ISBN: 978-3-642-02454-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics