A Secure Hierarchical Identify Authentication Scheme in Mobile IPv6 Networks

被引:0
作者
Zhi, Zhang [1 ]
机构
[1] Wuhan Inst Technol, Coll Comp, Wuhan 430074, Hubei, Peoples R China
来源
PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS | 2008年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To MIPv6 networks, Identify authentication is an important part of the network security. In this paper, we proposed a secure identify authentication scheme. Which considers inters domain trust relationship between mobile node home domain and the access domain in the pre-handoff procedure and realizes effective mutual authentication between mobile node(MN) and the access domain. Based on the combined public key algorithm and double private key, a hierarchical signature and verification scheme is designed in one round mutual authentication. Theoretical analysis and numerical result s show that proposed scheme is more effective in reducing total authentication and handoff delay and the signaling overhead than relative schemes. Security analysis shows, based on the security of CPK algorithm and IBS, the proposed scheme is sufficient for private key privacy, signature unforgeability in mobile IPv6 networks.
引用
收藏
页码:1813 / 1817
页数:5
相关论文
共 50 条
[41]   A Localized Authentication and Billing Scheme for Proxy Mobile IPv6 in VANETs [J].
Yeh, Lo-Yao ;
Chang, Jee-Gong ;
Huang, Weicheng ;
Tsai, Yi-Lang .
2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
[42]   Comments on "SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks" [J].
You, Ilsun ;
Leu, Fang-Yie .
IEEE SYSTEMS JOURNAL, 2018, 12 (01) :1038-1041
[43]   Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks" [J].
Alizadeh, Mojtaba ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Manaf, Azizah Abdul ;
Sakurai, Kouichi ;
Anada, Hiroki ;
Keshavarz, Hassan ;
Chaudhry, Shehzad Ashraf ;
Khan, Muhammad Khurram .
PLOS ONE, 2015, 10 (11)
[44]   A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing [J].
Alizadeh, Mojtaba ;
Tadayon, Mohammad Hesam ;
Sakurai, Kouichi ;
Anada, Hiroaki ;
Jolfaei, Alireza .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (04)
[45]   Providing QoS in fast and hierarchical mobile IPv6 networks [J].
Wan, Zheng ;
Pan, Xuezeng ;
Chen, Xiaofeng .
Global Mobile Congress 2005, 2005, :441-446
[46]   A Mobile IPv6 based Route Optimization Scheme for Mobile Networks [J].
Prakash, Arun ;
Verma, Rajesh ;
Tripathi, Rajeev ;
Naik, Kshirasagar .
2009 ANNUAL IEEE INDIA CONFERENCE (INDICON 2009), 2009, :378-+
[47]   A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6 [J].
Lee, Jong-Hyouk ;
Han, Youn-Hee ;
Gundavelli, Sri ;
Chung, Tai Myoung .
TELECOMMUNICATION SYSTEMS, 2009, 41 (04) :279-292
[48]   Adaptive route optimization in hierarchical mobile IPv6 networks [J].
Pack, Sangheon ;
Shen, Xuemin ;
Mark, Jon W. ;
Pan, Jianping .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2007, 6 (08) :903-914
[49]   Analytical-numerical study of Mobile IPv6 and Hierarchical Mobile IPv6 [J].
Yi, MK ;
Hwang, CS .
DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 :168-179
[50]   Proactive load control scheme at mobility anchor point in hierarchical mobile IPv6 networks [J].
Pack, S ;
Lee, B ;
Choi, Y .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2004, E87D (12) :2578-2585