Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment

被引:0
|
作者
Park, Seong-Soo [1 ]
Lee, Jong-Hyouk [1 ]
Chung, Tai-Myoung [2 ]
机构
[1] Sungkyunkwan Univ, Dept Comp Engn, Suwon 440746, South Korea
[2] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon 440746, South Korea
关键词
Proxy MIPv6; EAP-TLS; BAN Logic; Certificate; Authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In PMIPv6, it is possible to support mobility for IPv6 nodes without software stack to exchange the signaling messages to control its movement. EAP-TLS supports for certificate-based mutual authentication, utilizing the protected ciphersuite negotiation, mutual authentication and key management capabilities of the TLS protocol. In this paper, we describe a certificate-based public key authentication mechanism for Proxy Mobile IPv6 environments. The certificate-based authentication mechanism is based on EAP-TLS that supports the mutual authentication during its ciphersuit negotiation. The proposed certificate-based authentication mechanism that involves initial authentication and handoff authentication is analyzed by BAN logic.
引用
收藏
页码:885 / +
页数:3
相关论文
共 50 条
  • [1] A traffic analysis of authentication methods for proxy mobile IPv6
    Lee, Jong-Hyouk
    Chung, Tai-Myoung
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 512 - 517
  • [2] An authentication method for proxy mobile IPv6 and performance analysis
    Zhou, Huachun
    Zhang, Hongke
    Qin, Yajuan
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (05) : 445 - 454
  • [3] A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6
    Lee, Jong-Hyouk
    Han, Youn-Hee
    Gundavelli, Sri
    Chung, Tai Myoung
    TELECOMMUNICATION SYSTEMS, 2009, 41 (04) : 279 - 292
  • [4] Security analysis and enhanced user authentication in proxy mobile IPv6 networks
    Kang, Dongwoo
    Jung, Jaewook
    Lee, Donghoon
    Kim, Hyoungshick
    Won, Dongho
    PLOS ONE, 2017, 12 (07):
  • [5] Security Enhancement on an Authentication Method for Proxy Mobile IPv6
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ye, Ayong
    PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 345 - +
  • [6] Security Enhancement on an Authentication Method for Proxy Mobile IPv6
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ye, Ayong
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 412 - 415
  • [7] A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6
    Jong-Hyouk Lee
    Youn-Hee Han
    Sri Gundavelli
    Tai-Myoung Chung
    Telecommunication Systems, 2009, 41 : 279 - 292
  • [8] Security Analysis of Proxy Mobile IPv6 Authentication Protocol with IPv4 Support
    Tie, Ling
    He, Di
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3683 - 3687
  • [9] Diffie-Hellman key based authentication in proxy mobile IPv6
    Kim, HyunGon
    Lee, Jong-Hyouk
    MOBILE INFORMATION SYSTEMS, 2010, 6 (01) : 107 - 121
  • [10] A Comparative Analysis on the Signaling Load of Proxy Mobile IPv6 and Hierarchical Mobile IPv6
    Yi, Myung-Kyu
    Choi, Jin-Woo
    Yang, Young-Kyu
    ISWPC: 2009 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, 2009, : 11 - 15