Abstract

Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

Highlights

  • Mobile devices have been experiencing rapid growth as people utilize these devices to access different types of services, including the Internet browsing, file sharing, video conferencing, and multimedia applications, anytime and anywhere [1]

  • The Mobile IPv6 (MIPv6) [2] is a standard of the Internet Engineering Task Force (IETF), that facilitates the roaming of the mobile nodes in the IPv6 network

  • The SPAM includes three stages known as the initial registration, mutual authentication process for both the Mobile Access Gateway (MAG) and the mobile node (MN), and the password changing process

Read more

Summary

Introduction

Mobile devices have been experiencing rapid growth as people utilize these devices to access different types of services, including the Internet browsing, file sharing, video conferencing, and multimedia applications, anytime and anywhere [1]. Proxy Mobile IPv6 (PMIPv6) is a networkbased mobility management protocol, which offers mobility services for mobile nodes without the involvement of the mobile nodes in signaling communications This particular protocol is being utilized as a variant of the wireless networks, including the 3GPP2, WiMAX, and the LAN networks as they need a low mobility signaling over the wireless links [8]. The SPAM includes three stages known as the initial registration, mutual authentication process for both the MAG and the MN, and the password changing process. The smart card verifies whether the equation, h(PWMN) È c2 = c1, to check mobile user authentication It generates N and compute AIDMN = IDMN È h(c5 k N1) and AUTHMN = h(c1 k N1). MN ! MAG: The authentication request, AIDMN, c3, Ec4(AUTHMN k N1), is generated by the MN and sent to the MAG

The MN verification by the MAG
The MAG verification
The LMA verification
Proposed Method
Authentication Procedure
Revocation Procedure
Revocation procedure
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.