ABSTRACT
Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working group that allows the delivery of the packets to mobile nodes when they moves to a new network based on its old IP address. Due to the increase of fraudulent activities in the current world, wanted level for the security feature is increased. But usage of security must be provided without compromising the efficiency. In this paper a secure and efficient registration protocol is proposed for IP Mobility, as the security feature adopted is directly proportional to the registration delay time. This protocol provides security between the mobility agents using AES and HMAC algorithm with reduction in registration time. It also secures messages between a mobile node and agents, and analyses the various protocols in the Mobile IP environment with this approach, based on different features. Based on the numerical results, the proposed protocol outfits the existing protocol based on the security issues and registration competency. Here, an attempt has been made to simulate the Mobile IP scenario for the proposed protocol with the use of NS-2 [5] network simulator.
- C. Perkins, Ed, 'Mobile IP,' IEEE Communications Magazine, May 1997 Google ScholarDigital Library
- J. Sufatrio and Lam. K. Y, 'Mobile-IP registration protocol: A security attack and new secure minimal public-key based authentication,' Proc.1999 Int. Symp. Parallel Architectures, September 1999. Google ScholarDigital Library
- Jacobs, S. 'Mobile IP Public Key Based Authentication,' Internet Draft, draft jacobs-mobileip-pki-auth-00.txt, Work in progress, 1998.Google Scholar
- Chung, S., Chae, K. 'An Efficient Public Key-based Authentication with Mobile IP in E-Commerce', In: Proceedings of the International Conference on Parallel and Distributed Systems, IEEE Press, New York, 2000.Google Scholar
- 'The NS Manual', http://www.isi.edu/nsnam/ns/ns-documentation.htmlGoogle Scholar
- Zao, J., Kent, S., Gahm1, Joshua, 'A public key based secure Mobile IP,' Wireless Networks 5, 373--390, 1999. Google ScholarDigital Library
- Zhang, S., Xu, G., Hu, Z., Yang, Y., Zhou, X. 'A Mobile IP Authentication Protocol Based on Identity,' Journal of BUPT 3, 86--88, 2005.Google Scholar
- Kwang, C. 'ID-Based Secure Session Key Exchange Scheme to Reduce Registration Delay with AAA in Mobile IP Networks,' Computational Science -- Springer, Heidelberg, ICCS LNCS, vol. 3515, pp. 510--C518, 2005. Google ScholarDigital Library
- Al-Riyami, S., and Paterson, K. G 'Certificateless public key cryptography' in Laih, C. S. (Ed.), Asiacrypt, LNCS, vol. 2894, pp. 452--473, 2003.Google Scholar
- X. Li, K. Chen, and L. Sun. 'Certificatelss signature and proxy signature schemes from bilinear pairing', Lithuanian Mathematical Journal. Vol. 45, No. 1, pp. 95--103, 2005.Google ScholarCross Ref
- M. C. Gorantla and A. Saxena,' An Efficient Certificateless Signature Scheme', Springer-Verlag, CIS 2005, LNAI 3802, pp. 110--116, 2005. Google ScholarDigital Library
- Lanjun Dang, Weidong Kou 'Efficient ID-Based Registration Protocol Featured with User Anonymity in Mobile IP Networks', IEEE transactions on wireless communications, vol. 9, no. 2, February 2010. Google ScholarDigital Library
- Lanjun Dang, Weidong Kou 'Improvement of Mobile IP Registration Using Self-Certified Public Keys', IEEE Transactions On Mobile Computing, Tmc-2007-03-0070.R1, 2007.Google Scholar
- C. Perkins, 'IP mobility support,' IETF RFC 2002, Oct. 1996.Google ScholarDigital Library
- C. Perkins, 'IP mobility support for IPv4,' IETF RFC 3344, Aug. 2002. Google ScholarDigital Library
- C. Y. Yang and C. Y. Shiu, 'A secure Mobile IP registration protocol,' International J. Network Security, vol. 1, no. 1, pp. 38--45, July 2005.Google Scholar
- H. Haverinen, N. Asokan, and T. Maattanen, 'Authentication and key generation for Mobile IP using GSM authentication and roaming,' in Proc. IEEE ICC'01, vol. 8, pp. 2453--2457, June 2001.Google Scholar
- D. H. Choi, H. Kim, and K. Jung, 'A secure Mobile IP authentication based on identification protocol,' in Proc. IEEE ISPACS 2004, pp. 709--712, Nov. 2004.Google Scholar
- B. G. Lee, D. H. Choi, H. G. Kim, S. W. Sohn, and K. H. Park, 'Mobile IP and WLAN with AAA authentication protocol using Identity-based cryptography,' in Proc. IEEE ICT'03, vol. 1, pp.597--603, 23 Feb. 2003.Google Scholar
- K. C. Jeong, H. Choo, and S. Y. Ha, 'ID-based secure session key exchange scheme to reduce registration delay with AAA in Mobile IP networks,' in ICCS 2005, LNCS 3515, pp. 510--518. Springer-Verlag, 2005. Google ScholarDigital Library
- A. Shamir, 'Identity-based cryptosystems and signature schemes,' in G. R. Blakley and D. Chaum (eds.): Advances in Cryptology- CRYPTO'84, LNCS 196, pp. 47--53. Springer-Verlag, 1985. Google ScholarDigital Library
- D. Boneh and M. K. Franklin, 'Identity-based encryption from the Weil pairing,' in J. Kilian (ed.): Advances in Cryptology-CRYPTO'01, LNCS 2139, pp. 213--229. Springer-Verlag, 2001. Google ScholarDigital Library
- R. W. Zhu, G. Yang, and D. S. Wong, 'An efficient Identity-based key exchange protocol with KGS forward security for low-power devices,' in X. Deng and Y. Ye (eds.): WINE 2005, LNCS 3828, pp. 500--509. Springer-Verlag, 2005. Google ScholarDigital Library
- J. Zhu and J. Ma., 'A new authentication scheme with anonymity for wireless environments,' IEEE Trans. Consum. Electron, vol. 50, no. 1, pp. 231--235, 2004. Google ScholarDigital Library
- K. Mangipudi and R. Katti, 'A hash-based strong password authentication protocol with user anonymity,' International J. Netw. Security, vol. 2, no. 3, pp. 205--209, May 2006.Google Scholar
- A. Datta, 'Security analysis of network protocols compositional reasoning and complexity-theoretic foundations,' Ph.D. dissertation, Dept. of Computer Science, Standford Univ., Stanford, Calif., 2005. Google ScholarDigital Library
- L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller, 'Efficient authentication and key distribution in wireless IP networks,' IEEE Wireless Commun., vol. 10, no. 6, pp. 52--61, Dec. 2003. Google ScholarDigital Library
- C. Perkins and P. Calhoun, 'Authentication, authorization, and accounting (AAA) registration keys for Mobile IP,' IETF RFC 3957, Mar. 2005.Google Scholar
- H. Krawczyk, M. Bellare, and R. Canetti, 'HMAC: keyed-hashing for message authentication,' IETF RFC 2104, Feb. 1997. Google ScholarDigital Library
- RFC 2104 'HMAC: keyed-hashing for message authentication', 1997.Google Scholar
- Cheng-Ying Yang and Cheng-Yeh Shiu,' A Secure Mobile IP Registration Protocol', International Journal of Network Security, Vol.1, No.1, PP.38--45, July 2005Google Scholar
- Xuefei Cao, Weidong Kou, Huaping Li, 'Secure Mobile IP Registration Scheme with AAA from Parings to Reduce Registration Delay', IEEE, 2006.Google Scholar
- Xuefei Cao, Weidong Kou, Lanjun Dang and Kai Fan,' Efficient Mobile IP Registration from Pairings' Key Laboratory of integrated Service Networks, Xidian University, Xi'an 710071, P. R. China, November 2006.Google Scholar
- Chou-Chen Yang, Jian-Wei Li, Ting-Yi Chang,' A Novel Mobile IP Registration Scheme for Hierarchical Mobility Management', Proceedings of the 2003 International Conference on Parallel Processing Workshops (ICPPW'03), IEEE,1530--2016, 2003.Google Scholar
Index Terms
- A secure and efficient registration for IP mobility
Recommendations
Toward IP converged heterogeneous mobility: A network controlled approach
Envisioning a future where mobile terminals equipped with one or more network devices are able to roam across wireless or wired networks, in a diverse macro and micro wireless cells environment, requires the development of enhanced methods to control IP-...
Cellular universal IP for nested network mobility
In recent years, network mobility (NEMO) has been studied extensively due to its potential applications in military and public transportation. NEMO basic support protocol (NBSP), the current de facto NEMO standard based on mobile IPv6, can be readily ...
Cellular universal IP: a low delay mobility scheme based on universal IP addressing
MSWiM '05: Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systemsThe concept of care-of-address (CoA) is a major cause of excessive handoff delay in Mobile IPv6 for real time multimedia traffic. Many schemes eliminate the use of CoA at the micro-mobility scale, but leave the macro-mobility unsolved. This paper ...
Comments