skip to main content
10.1145/2490428.2490458acmconferencesArticle/Chapter ViewAbstractPublication PagessecuritConference Proceedingsconference-collections
poster

A secure and efficient registration for IP mobility

Authors Info & Claims
Published:17 August 2012Publication History

ABSTRACT

Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working group that allows the delivery of the packets to mobile nodes when they moves to a new network based on its old IP address. Due to the increase of fraudulent activities in the current world, wanted level for the security feature is increased. But usage of security must be provided without compromising the efficiency. In this paper a secure and efficient registration protocol is proposed for IP Mobility, as the security feature adopted is directly proportional to the registration delay time. This protocol provides security between the mobility agents using AES and HMAC algorithm with reduction in registration time. It also secures messages between a mobile node and agents, and analyses the various protocols in the Mobile IP environment with this approach, based on different features. Based on the numerical results, the proposed protocol outfits the existing protocol based on the security issues and registration competency. Here, an attempt has been made to simulate the Mobile IP scenario for the proposed protocol with the use of NS-2 [5] network simulator.

References

  1. C. Perkins, Ed, 'Mobile IP,' IEEE Communications Magazine, May 1997 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Sufatrio and Lam. K. Y, 'Mobile-IP registration protocol: A security attack and new secure minimal public-key based authentication,' Proc.1999 Int. Symp. Parallel Architectures, September 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Jacobs, S. 'Mobile IP Public Key Based Authentication,' Internet Draft, draft jacobs-mobileip-pki-auth-00.txt, Work in progress, 1998.Google ScholarGoogle Scholar
  4. Chung, S., Chae, K. 'An Efficient Public Key-based Authentication with Mobile IP in E-Commerce', In: Proceedings of the International Conference on Parallel and Distributed Systems, IEEE Press, New York, 2000.Google ScholarGoogle Scholar
  5. 'The NS Manual', http://www.isi.edu/nsnam/ns/ns-documentation.htmlGoogle ScholarGoogle Scholar
  6. Zao, J., Kent, S., Gahm1, Joshua, 'A public key based secure Mobile IP,' Wireless Networks 5, 373--390, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Zhang, S., Xu, G., Hu, Z., Yang, Y., Zhou, X. 'A Mobile IP Authentication Protocol Based on Identity,' Journal of BUPT 3, 86--88, 2005.Google ScholarGoogle Scholar
  8. Kwang, C. 'ID-Based Secure Session Key Exchange Scheme to Reduce Registration Delay with AAA in Mobile IP Networks,' Computational Science -- Springer, Heidelberg, ICCS LNCS, vol. 3515, pp. 510--C518, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Al-Riyami, S., and Paterson, K. G 'Certificateless public key cryptography' in Laih, C. S. (Ed.), Asiacrypt, LNCS, vol. 2894, pp. 452--473, 2003.Google ScholarGoogle Scholar
  10. X. Li, K. Chen, and L. Sun. 'Certificatelss signature and proxy signature schemes from bilinear pairing', Lithuanian Mathematical Journal. Vol. 45, No. 1, pp. 95--103, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  11. M. C. Gorantla and A. Saxena,' An Efficient Certificateless Signature Scheme', Springer-Verlag, CIS 2005, LNAI 3802, pp. 110--116, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lanjun Dang, Weidong Kou 'Efficient ID-Based Registration Protocol Featured with User Anonymity in Mobile IP Networks', IEEE transactions on wireless communications, vol. 9, no. 2, February 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Lanjun Dang, Weidong Kou 'Improvement of Mobile IP Registration Using Self-Certified Public Keys', IEEE Transactions On Mobile Computing, Tmc-2007-03-0070.R1, 2007.Google ScholarGoogle Scholar
  14. C. Perkins, 'IP mobility support,' IETF RFC 2002, Oct. 1996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Perkins, 'IP mobility support for IPv4,' IETF RFC 3344, Aug. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Y. Yang and C. Y. Shiu, 'A secure Mobile IP registration protocol,' International J. Network Security, vol. 1, no. 1, pp. 38--45, July 2005.Google ScholarGoogle Scholar
  17. H. Haverinen, N. Asokan, and T. Maattanen, 'Authentication and key generation for Mobile IP using GSM authentication and roaming,' in Proc. IEEE ICC'01, vol. 8, pp. 2453--2457, June 2001.Google ScholarGoogle Scholar
  18. D. H. Choi, H. Kim, and K. Jung, 'A secure Mobile IP authentication based on identification protocol,' in Proc. IEEE ISPACS 2004, pp. 709--712, Nov. 2004.Google ScholarGoogle Scholar
  19. B. G. Lee, D. H. Choi, H. G. Kim, S. W. Sohn, and K. H. Park, 'Mobile IP and WLAN with AAA authentication protocol using Identity-based cryptography,' in Proc. IEEE ICT'03, vol. 1, pp.597--603, 23 Feb. 2003.Google ScholarGoogle Scholar
  20. K. C. Jeong, H. Choo, and S. Y. Ha, 'ID-based secure session key exchange scheme to reduce registration delay with AAA in Mobile IP networks,' in ICCS 2005, LNCS 3515, pp. 510--518. Springer-Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Shamir, 'Identity-based cryptosystems and signature schemes,' in G. R. Blakley and D. Chaum (eds.): Advances in Cryptology- CRYPTO'84, LNCS 196, pp. 47--53. Springer-Verlag, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Boneh and M. K. Franklin, 'Identity-based encryption from the Weil pairing,' in J. Kilian (ed.): Advances in Cryptology-CRYPTO'01, LNCS 2139, pp. 213--229. Springer-Verlag, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. W. Zhu, G. Yang, and D. S. Wong, 'An efficient Identity-based key exchange protocol with KGS forward security for low-power devices,' in X. Deng and Y. Ye (eds.): WINE 2005, LNCS 3828, pp. 500--509. Springer-Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Zhu and J. Ma., 'A new authentication scheme with anonymity for wireless environments,' IEEE Trans. Consum. Electron, vol. 50, no. 1, pp. 231--235, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. K. Mangipudi and R. Katti, 'A hash-based strong password authentication protocol with user anonymity,' International J. Netw. Security, vol. 2, no. 3, pp. 205--209, May 2006.Google ScholarGoogle Scholar
  26. A. Datta, 'Security analysis of network protocols compositional reasoning and complexity-theoretic foundations,' Ph.D. dissertation, Dept. of Computer Science, Standford Univ., Stanford, Calif., 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller, 'Efficient authentication and key distribution in wireless IP networks,' IEEE Wireless Commun., vol. 10, no. 6, pp. 52--61, Dec. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. C. Perkins and P. Calhoun, 'Authentication, authorization, and accounting (AAA) registration keys for Mobile IP,' IETF RFC 3957, Mar. 2005.Google ScholarGoogle Scholar
  29. H. Krawczyk, M. Bellare, and R. Canetti, 'HMAC: keyed-hashing for message authentication,' IETF RFC 2104, Feb. 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. RFC 2104 'HMAC: keyed-hashing for message authentication', 1997.Google ScholarGoogle Scholar
  31. Cheng-Ying Yang and Cheng-Yeh Shiu,' A Secure Mobile IP Registration Protocol', International Journal of Network Security, Vol.1, No.1, PP.38--45, July 2005Google ScholarGoogle Scholar
  32. Xuefei Cao, Weidong Kou, Huaping Li, 'Secure Mobile IP Registration Scheme with AAA from Parings to Reduce Registration Delay', IEEE, 2006.Google ScholarGoogle Scholar
  33. Xuefei Cao, Weidong Kou, Lanjun Dang and Kai Fan,' Efficient Mobile IP Registration from Pairings' Key Laboratory of integrated Service Networks, Xidian University, Xi'an 710071, P. R. China, November 2006.Google ScholarGoogle Scholar
  34. Chou-Chen Yang, Jian-Wei Li, Ting-Yi Chang,' A Novel Mobile IP Registration Scheme for Hierarchical Mobility Management', Proceedings of the 2003 International Conference on Parallel Processing Workshops (ICPPW'03), IEEE,1530--2016, 2003.Google ScholarGoogle Scholar

Index Terms

  1. A secure and efficient registration for IP mobility

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SecurIT '12: Proceedings of the First International Conference on Security of Internet of Things
              August 2012
              266 pages
              ISBN:9781450318228
              DOI:10.1145/2490428

              Copyright © 2012 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 17 August 2012

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • poster
            • Article Metrics

              • Downloads (Last 12 months)1
              • Downloads (Last 6 weeks)0

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader