Skip to main content
Log in

Integrating Identity-Based Encryption in the Return Routability Protocol to Enhance Signal Security in Mobile IPv6

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In Mobile IPv6 (MIPv6), the authentication procedure between nodes has recently been an active research area. Return Routability Protocol (RRP) is a mechanism used in MIPv6 to provide the nodes with some authentication and to secure binding update messages. A large number of studies have discussed the weaknesses of this mechanism and its enhancement. In the current paper, a new approach called Return Routability Identity-Based Encryption protocol is proposed for the enhancement of security and authentication in the predecessor RRP. Hence, the proposed protocol is simulated and verified using a Murphi model checker. Finally, the simulation results show that strong security and authentication between the nodes have been achieved, and the current attacks in Return Routability have been addressed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Blanchet M. (2002) Migrating to IPv6: A practical guide for mobile and fixed networks. Wiley, NY, USA

    Google Scholar 

  2. Johnson, D., Perkins, C., & Arkko, J. (2004). Mobility support in IPv6 (RFC 3775).

  3. Aura T., Roe M. (2006) Designing the mobile IPv6 security protocol. Network and Information System Security 61: 1–27

    Google Scholar 

  4. Ahmed, I., Tariq, U., Mukhtar, S., Lhee, K., Yoo, S. W., Yanji, P., et al. (2007). Binding update authentication scheme for mobile IPv6. In 3rd international symposium on the information assurance and security, 2007 (pp. 109–114).

  5. Aura, T., Roe, M., & Arkko, J. (2002). Security of internet location management. In Proceedings of the 18th annual computer security applications conference 2002 (pp. 78–87).

  6. Radhakrishnan R., Jamil M., Mehfuz S. M. (2008) A robust return routability procedure for mobile IPv6. International Journal of Computer Science and Network Security 8: 234–240

    Google Scholar 

  7. Jeong, S., & Ki Shin, M. (2008). Route optimization scheme for Proxy mobile IPv6. In 10th international conference on the advanced communication technology, 2008 (pp. 1097–1100).

  8. Kavitha D., Murthy E. K., Hug S. Z. (2009) A secure route optimization protocol in mobile IPv6. International Journal of Computer and Network Security (IJCSNS) 9: 27–33

    Google Scholar 

  9. Chen, Y.-C., & Yang, F.-C. (2009). An efficient MIPv6 return routability scheme based on geometric computing. In Proceedings of world academy of science, engineering and technology, 2009 (Vol. 39, pp. 238–243).

  10. Huafei, Z., Feng, B., & Deng, R. H. (2004). Securing return routability protocol against active attack. In IEEE vehicular technology conference 2004 (pp. 3254–3257).

  11. Susanto, H., & Kim, B.-G. (2009). Per-connection return routability test in mobile IPv6. In Proceedings of the 2009 international conference on network-based information systems, 2009 (pp. 142–146).

  12. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. In Proceedings of crypto 84 on advances in cryptology, Santa Barbara, US, 1985 (pp. 47–53). NY: Springer.

  13. Voltag Security Web Site. (2010). Email security—the IBE architectural advantage overcoming the challenges of symmetric and PKI-based messaging. Available at: http://www.voltage.com/pdf/EmailSecurity_IBE_advantage.pdf. Last access on December 2010.

  14. Protocol Analysis using Murphi. (2010). Available at http://theory.stanford.edu/~aderek/murphi/links.html. last access on December 2010.

  15. Shmatikov V., Mitchell J. C. (2002) Finite state analysis of two contract signing protocols. Theoretical Computer Science 283(2): 271–304

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wafaa A. H. Ali Alsalihy.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ali Alsalihy, W.A.H., Alsayfi, M.S.S. Integrating Identity-Based Encryption in the Return Routability Protocol to Enhance Signal Security in Mobile IPv6. Wireless Pers Commun 68, 655–669 (2013). https://doi.org/10.1007/s11277-011-0474-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-011-0474-5

Keywords

Navigation