Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.1.165

A Hierarchical Authentication for Proxy Mobile IPv6 Networks  

Kim, KyungJoon (Yonsei University)
Baek, JaeJong (Republic of Korean Navy)
Song, JooSeok (Yonsei University)
Abstract
In this paper, a hierarchical authentication protocol is proposed to minimize authentication delay in proxy mobile IPv6 networks. The authentication function of the AAA server is distributed to the LMAs and the MAGs. If the LMAs or the MAGs have authentication information of the MNs, they authenticate the MN on behalf of the AAA servers. Therefore, the authentication delay is reduced. The AAA server is vulnerable to denial-of-service attack. If the AAA server is down, MNs cannot access the proxy mobile IPv6 network until they are authenticated. The proposed scheme reduces the load on the AAA server by distributing the authentication function to the LMAs and the MAGs.
Keywords
PMIPv6; EAP-AKA; Authentication; Key agreement;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Perkins, D. Johnson, and J. Arkko, "Mobility support in IPv6," IETF RFC: 6275, Jul. 2011.
2 S. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury, and B. Patil, "Proxy mobile IPv6," RFC 5213 Aug. 2008.
3 J. Arkko, V. Lehtovirta, and P. Eronen, "Improved extensible authentication protocol method for 3rd generation authentication and key agreement," RFC 5448, May 2009.
4 H. Kim and J. Lee, "Diffie-Hellman key based authentication in proxy mobile IPv6," Mobile Information Systems, pp. 107-121, Jan. 2010
5 Y. Chen, T. Juang, and Y. Lin, "A secure relay-Assisted handover protocol for proxy mobile IPv6 in 3GPP LTE systems," Wireless Pers Communications, pp. 629-656, Dec. 2011
6 J. Salowey, L. Dondeti, V. Narayanan, and M. Nakhjiri, "Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK)," RFC 5247, Aug. 2008.
7 J. Arkko and H. Haverinen, "Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA)," RFC 4187, Jan. 2006.