Skip to main content
Log in

IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Internet Key Exchange version 2 (IKEv2) is taking the responsibility for distribution and management of reliable authentication key. IKEv2 can secure fast hand off, confidentiality of data, safe transmission, and multihoming to transmission node. In this paper, we designed and constructed the network based on real mobile node and experimented the modeling of IKEv2 protocol through the simulation. We analyzed the resetting of authentication key and re-exchange problem. And we experimented the effect that key exchange is affected by a limited bandwidth based on data analysis. To overcome delay time, we proposed multi-interface of node and analyzed performance and latency for authentication setting and exchange process. The simulation results show that re-authentication of key is impossible to reset because of limited bandwidth of network. Also, the use of proposed multi-interface can minimize key exchange latency that happened by hand off for IPSec transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Wang CY, Huang HY, Hwang RH (2011) Mobility management in ubiquitous environments. Pers Ubiquitous Comput 15(3):235–251

    Article  Google Scholar 

  2. Kim J, Lu J, Hsu CH (2012) Advanced security technologies and applications for ubiquitous computing. Pers Ubiquitous Comput. doi:10.1007/s00779-012-0533-2

    Google Scholar 

  3. English C, Terzis S, Nixon P (2006) Towards self-protecting ubiquitous systems: monitoring trust-based interactions. Pers Ubiquitous Comput 10(1):50–54

    Article  Google Scholar 

  4. Kent S, Atkinson R (1998) Security architecture for the internet protocol. RFC2401. http://www.ietf.org/rfc/rfc2401.txt

  5. Arkko J, Devarapalli V, Dupont F (2004) Using IPsec to protect mobile IPv6 signaling between mobile nodes and home agents. RFC3776. http://www.ietf.org/rfc/rfc3776.txt

  6. Han K, Mun H, Shon T, Yeun CY, Park JJ (2012) Secure and efficient public key management in next generation mobile networks. Pers Ubiquitous Comput 16(6):677–685

    Article  Google Scholar 

  7. Dupont F (2005) Address management for IKE version 2. http://tools.ietf.org/html/draft-dupont-ikev2-addrmgmt-08

  8. IEKv2 Mobility and Multihoming (Mobike) WG. http://tools.ietf.org/wg/mobike/

  9. Lee Y, Lee GY, Kim HJ, Jeong CK (2012) Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j. Pers Ubiquit Comput 16(6):697–706

    Google Scholar 

  10. Kent S, Atkinson R (1998) IP authentication header. RFC 2402. http://www.ietf.org/rfc/rfc2402.txt

  11. Kent S, Atkinson R (1998) IP encapsulating security payload (ESP). RFC 2406. http://www.ietf.org/rfc/rfc2406.txt

  12. Kivinen T, Tschofenig H (2006) Design of the IEKv2 mobility and multihoming (MOBIKE) protocol. RFC4621. https://tools.ietf.org/rfc/rfc4621.txt

  13. Johnson D, Perkins C, Arkko J (2004) Mobility support in IPv6. RFC3775. http://www.ietf.org/rfc/rfc3775.txt

  14. Hagen S (2006) IPv6 essentials. O’Reilly Media, Sebastopol, CA

    Google Scholar 

  15. Miller MA, Miller PE (2000) Implementing IPv6: supporting the next generation internet protocols. Wiley, London

    Google Scholar 

  16. Wang W, Villaça RS, de Paula LB, Pasquini R, Verdi FL, Magalhães MF (2008) An architecture for mobility support in a next generation internet. In: Proceedings of the international conference on advanced information networking and application (AINA), pp 818–825

  17. Linux FreeS/WAN. http://www.freeswan.org

  18. NIST IPSec and IKE simulation tool (NIIST). http://www.antd.nist.gov/niist/

  19. USAGI (UniverSAl playground for Ipv6) project. http://www.linux-ipv6.org/

  20. MIPv6 for Linux. http://tldp.org/HOWTO/Mobile-IPv6-HOWTO/

  21. SSFNet (scalable simulation framework network models). http://www.ssfnet.org

  22. Kaufman C (2005) Internet key exchange (IKEv2) protocol. RFC4306. http://www.ietf.org/rfc/rfc4306.txt

Download references

Acknowledgments

Fundings for this paper was provided by Namseoul University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeom Goo Kim.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, D.H., Kim, J.G. IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks. Pers Ubiquit Comput 18, 493–501 (2014). https://doi.org/10.1007/s00779-013-0669-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-013-0669-8

Keywords

Navigation