Abstract
The issue of securing control signaling in mobility management is still an unsolved concern. To offer enhanced security, features in the recent mobile IP protocols rely on the use of IP Security (IPSec) Security Association (SA). However, the SA itself will cease to be valid if a mobile node moves or a network moves. This paper proposes secure mobile IP (SecMIP) scheme based on one-time transaction key agreements instead of using the pre-generated IPsec SA. In the proposed scheme, the mobile node is responsible for relaying its blind key information from the Home Agent (HA) to the Foreign Agent (FA) while the relating secret value is securely kept in its HA. Receiving the Binding Update (BU) message that contains the FA’s blind key, the HA can calculate the same transaction key as the FA. We analyze the time required for the enemy to succeed to attack our SecMIP scheme on integrity and authentication. Based on the analysis results, we suggest the optimum use of the operational parameters in our SecMIP scheme relating to the length of the secret value and the length of the prime number q in digit. The derived dimensions can guarantee an average of 1 year required for exhaustive key searching by brute force approaches while maintaining a maximum addition of 200 millisecond time latency for the HA and the FA to process the secured BU message.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Li, R., Wei, Y., Lin, H., Yang, R., Wang, S., Wang, H.: Mobility Management for Global IP Connectivity of MANET. In: 5th IEEE Emergency Situations, Consumer Communications and Networking Conference, CCNC 2008, January 10-12, pp. 217–221 (2008)
Jung, Y.C., Peradilla, M.: Tunnel Gateway Satisfying Mobility and Security Requirements of Mobile and IP-Based Networks. Journal of Communications and Networks 13(6), 583–590 (2011)
Rehunathan, D., Atkinson, R., Bhatti, S.: Enabling Mobile Networks through secure naming. In: IEEE Military Communications Conference, MILCOM 2009, October 18-21, pp. 1–8 (2009)
Ghosh, A., Talpade, R., Elaoud, M., Bereschinsky, M.: Securing ad-hoc networks using IPsec. In: IEEE Military Communications Conference, MILCOM 2005, vol. 5, pp. 2948–2953 (October 2005)
Moravejosharieh, A., Modares, H., Salleh, R.: Overview of Mobile IPv6 Security. In: 2012 Third International Conference on Intelligent Systems, Modelling and Simulation (ISMS), February 8-10, pp. 584–587 (2012)
Kandikattu, R., Jacob, L.: Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network. International Journal of Network Security 10(3), 190–203 (2010)
Perkins, C.: IP Mobility Support for IPv4, Network Working Group, RFC 3220 (January 2002)
Ding, S.: Mobile IP handoffs among multiple internet gateways in mobile ad hoc networks. Communications IET 3(5), 752–763 (2009)
Khair, M.G., Kantarci, B., Mouftah, H.T.: Towards cellular IP address assignment in wireless heterogeneous sensor networks. In: 2011 IEEE Symposium on Computers and Communications (ISCC), June 28 -July 1, pp. 615–619 (2011)
Droms, F.R.: Dynamic Host Configuration Protocol, Network Working Group, RFC 2131 (March 1997)
Devarapalli, V., Wakikawa, R., Petrescu, A., Thubert, P.: Network Mobility (NEMO) Basic Support Protocol, RFC 3963 (January 2005)
Morera, R., McAuley, A.: Adapting DNS to dynamic ad hoc networks. In: IEEE Military Communications Conference 2005, MILCOM 2005, October 17-20, vol. 2, pp. 1303–1308 (2005)
Cheng, H., Maltz, D.A., Li, J., Greenberg, A.: Public DNS system and Global Traffic Management. In: 2011 Proceedings IEEE INFOCOM, April 10-15, pp. 2615–2623 (2011)
Jung, Y.,C., Atwood, J.W.: Design of robust DNS adaptable to dynamic Ad hoc networks. In: International Conference on DNS EASY (October 18, 2011)
Hu, P., Hong, P., Li, J.: Name resolution in on-demand MANET. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2005), August 22-24, vol. 3, pp. 462–466 (2005)
Yahya, B., Ben-Othman, J.: Achieving host mobility using DNS dynamic updating protocol. In: 33rd IEEE Conference on Local Computer Networks, LCN 2008, October 14-17, pp. 634–638 (2008)
US DoD: High-Assurance IP Encryption Interoperability Specification (HAIPE IS), Version 1.3.5 (May 2004)
Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, RFC 2401 (November 1998)
Encarnacao, A., Bayer, G.: Mobile IPv6 Binding Update - Return Routability Procedure (2008)
Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6, IETF draft (June 2004)
Simpson, W.: IPng Mobility Considerations, RFC 1688 (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jung, Y., Festijo, E. (2012). Secure Mobility Management Based on Session Key Agreements. In: Xiang, Y., Lopez, J., Kuo, CC.J., Zhou, W. (eds) Cyberspace Safety and Security. CSS 2012. Lecture Notes in Computer Science, vol 7672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35362-8_32
Download citation
DOI: https://doi.org/10.1007/978-3-642-35362-8_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35361-1
Online ISBN: 978-3-642-35362-8
eBook Packages: Computer ScienceComputer Science (R0)