Abstract
In Mobile IPv6 (MIPv6), the authentication procedure between nodes has recently been an active research area. Return Routability Protocol (RRP) is a mechanism used in MIPv6 to provide the nodes with some authentication and to secure binding update messages. A large number of studies have discussed the weaknesses of this mechanism and its enhancement. In the current paper, a new approach called Return Routability Identity-Based Encryption protocol is proposed for the enhancement of security and authentication in the predecessor RRP. Hence, the proposed protocol is simulated and verified using a Murphi model checker. Finally, the simulation results show that strong security and authentication between the nodes have been achieved, and the current attacks in Return Routability have been addressed.
Similar content being viewed by others
References
Blanchet M. (2002) Migrating to IPv6: A practical guide for mobile and fixed networks. Wiley, NY, USA
Johnson, D., Perkins, C., & Arkko, J. (2004). Mobility support in IPv6 (RFC 3775).
Aura T., Roe M. (2006) Designing the mobile IPv6 security protocol. Network and Information System Security 61: 1–27
Ahmed, I., Tariq, U., Mukhtar, S., Lhee, K., Yoo, S. W., Yanji, P., et al. (2007). Binding update authentication scheme for mobile IPv6. In 3rd international symposium on the information assurance and security, 2007 (pp. 109–114).
Aura, T., Roe, M., & Arkko, J. (2002). Security of internet location management. In Proceedings of the 18th annual computer security applications conference 2002 (pp. 78–87).
Radhakrishnan R., Jamil M., Mehfuz S. M. (2008) A robust return routability procedure for mobile IPv6. International Journal of Computer Science and Network Security 8: 234–240
Jeong, S., & Ki Shin, M. (2008). Route optimization scheme for Proxy mobile IPv6. In 10th international conference on the advanced communication technology, 2008 (pp. 1097–1100).
Kavitha D., Murthy E. K., Hug S. Z. (2009) A secure route optimization protocol in mobile IPv6. International Journal of Computer and Network Security (IJCSNS) 9: 27–33
Chen, Y.-C., & Yang, F.-C. (2009). An efficient MIPv6 return routability scheme based on geometric computing. In Proceedings of world academy of science, engineering and technology, 2009 (Vol. 39, pp. 238–243).
Huafei, Z., Feng, B., & Deng, R. H. (2004). Securing return routability protocol against active attack. In IEEE vehicular technology conference 2004 (pp. 3254–3257).
Susanto, H., & Kim, B.-G. (2009). Per-connection return routability test in mobile IPv6. In Proceedings of the 2009 international conference on network-based information systems, 2009 (pp. 142–146).
Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Proceedings of crypto 84 on advances in cryptology, Santa Barbara, US, 1985 (pp. 47–53). NY: Springer.
Voltag Security Web Site. (2010). Email security—the IBE architectural advantage overcoming the challenges of symmetric and PKI-based messaging. Available at: http://www.voltage.com/pdf/EmailSecurity_IBE_advantage.pdf. Last access on December 2010.
Protocol Analysis using Murphi. (2010). Available at http://theory.stanford.edu/~aderek/murphi/links.html. last access on December 2010.
Shmatikov V., Mitchell J. C. (2002) Finite state analysis of two contract signing protocols. Theoretical Computer Science 283(2): 271–304
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ali Alsalihy, W.A.H., Alsayfi, M.S.S. Integrating Identity-Based Encryption in the Return Routability Protocol to Enhance Signal Security in Mobile IPv6. Wireless Pers Commun 68, 655–669 (2013). https://doi.org/10.1007/s11277-011-0474-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-011-0474-5