Abstract
In PMIPv6, it is possible to support mobility for IPv6 nodes without software stack to exchange the signaling messages to control its movement. EAP-TLS supports for certificate-based mutual authentication, utilizing the protected ciphersuite negotiation, mutual authentication and key management capabilities of the TLS protocol. In this paper, we describe a certificate-based public key authentication mechanism for Proxy Mobile IPv6 environments. The certificate-based authentication mechanism is based on EAP-TLS that supports the mutual authentication during its ciphersuit negotiation. The proposed certificate-based authentication mechanism that involves initial authentication and handoff authentication is analyzed by BAN logic.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6, RFC 3775 (June 2004)
Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., Patil, B.: Proxy Mobile IPv6, RFC 5213 (August 2008)
Lee, J.-H., Lim, H.-J., Chung, T.-M.: A competent global mobility support scheme in NETLMM. International Journal of Electronics and Communications, online published (August 2008), doi:10.1016/j.aeue.2008.07.010
Lee, J.-H., Chung, T.-M., Gundavelli, S.: A Comparative Signaling Cost Analysis of Hierarchical Mobile IPv6 and Proxy Mobile IPv6. In: Proceedings of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2008) (September 2008)
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP), RFC 3748 (June 2004)
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.1, RFC 4346 (April 2006)
Simon, D., Aboba, B., Hurst, R.: The EAP-TLS Authentication Protocol, RFC 5216 (March 2008)
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems 8, 18–36 (1990)
Nakhjiri, M., Nakhjiri, M.: AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI, and IP Mobility. John Wiley & Sons Ltd., West Sussex (2005)
Lee, J.-H., Han, B.-J., Chung, T.-M., Lim, H.-J.: Network Mobility Basic Support within Proxy Mobile IPv6: scenarios and analysis (September 2008), draft-jhlee-netlmm-nemo-scenarios-01
Gaarder, K., Snekkenes, E.: Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol. Journal of Cryptology 3(2), 81–98 (1991)
Sufatrio, Yap, R.: Extending BAN Logic for Reasoning with Modern PKI-Based Protocols. In: IFIP International Conference on Network and Parallel Computing 2008, October 2008, pp. 190–197 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, SS., Lee, JH., Chung, TM. (2009). Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2009. ICCSA 2009. Lecture Notes in Computer Science, vol 5592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02454-2_69
Download citation
DOI: https://doi.org/10.1007/978-3-642-02454-2_69
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02453-5
Online ISBN: 978-3-642-02454-2
eBook Packages: Computer ScienceComputer Science (R0)