A traffic analysis of authentication methods for proxy mobile IPv6

被引:4
|
作者
Lee, Jong-Hyouk [1 ]
Chung, Tai-Myoung [1 ]
机构
[1] Sungkyunkwan Univ, Internet Management Technol Lab, Suwon 440746, Gyeonggi Do, South Korea
关键词
D O I
10.1109/ISA.2008.75
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy Mobile IPv6 has been proposed to enable a network-based mobility support which does not require a mobile host to be involved in mobility signaling. In the Proxy Mobile IPv6 specification, an authentication procedure is required as an initial part of registration for network access. However, the current specification does not provide the authentication procedure explicitly. Thus, in this paper, we propose authentication methods classified based on security level. Due to the limited resource of wireless networks, we analyze authentication traffic in terms of cost. The presented performance evaluation results demonstrate the impacts of each authentication method.
引用
收藏
页码:512 / 517
页数:6
相关论文
共 50 条
  • [1] An authentication method for proxy mobile IPv6 and performance analysis
    Zhou, Huachun
    Zhang, Hongke
    Qin, Yajuan
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (05) : 445 - 454
  • [2] Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment
    Park, Seong-Soo
    Lee, Jong-Hyouk
    Chung, Tai-Myoung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT I, 2009, 5592 : 885 - +
  • [3] A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6
    Lee, Jong-Hyouk
    Han, Youn-Hee
    Gundavelli, Sri
    Chung, Tai Myoung
    TELECOMMUNICATION SYSTEMS, 2009, 41 (04) : 279 - 292
  • [4] Security analysis and enhanced user authentication in proxy mobile IPv6 networks
    Kang, Dongwoo
    Jung, Jaewook
    Lee, Donghoon
    Kim, Hyoungshick
    Won, Dongho
    PLOS ONE, 2017, 12 (07):
  • [5] Security Enhancement on an Authentication Method for Proxy Mobile IPv6
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ye, Ayong
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 412 - 415
  • [6] Security Enhancement on an Authentication Method for Proxy Mobile IPv6
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ye, Ayong
    PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 345 - +
  • [7] A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6
    Jong-Hyouk Lee
    Youn-Hee Han
    Sri Gundavelli
    Tai-Myoung Chung
    Telecommunication Systems, 2009, 41 : 279 - 292
  • [8] Security Analysis of Proxy Mobile IPv6 Authentication Protocol with IPv4 Support
    Tie, Ling
    He, Di
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3683 - 3687
  • [9] A Comparative Analysis on the Signaling Load of Proxy Mobile IPv6 and Hierarchical Mobile IPv6
    Yi, Myung-Kyu
    Choi, Jin-Woo
    Yang, Young-Kyu
    ISWPC: 2009 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, 2009, : 11 - 15
  • [10] A Comparative Signaling Cost Analysis of Hierarchical Mobile IPv6 and Proxy Mobile IPv6
    Lee, Jong-Hyouk
    Chung, Tai-Myoung
    Gundavelli, Sri
    2008 IEEE 19TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2008, : 121 - 126