Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.2.397

Secure and Efficient Binding Updates in Host-Based Distributed Mobility Management  

Lee, Seyeong (Sungkyunkwan University)
Choi, Hyoung-Kee (Sungkyunkwan University)
Kim, EJin (Sungkyunkwan University)
Abstract
As mobile traffic increases rapidly, DMM (Distributed Mobility Management) has been proposed as a mobility management technology for seamless communication of mobile devices as mobile traffic increases rapidly. the DMM distributes mobility management from the core network to the edge network, enabling stable binding updates with low latency. However, the DMM still have network delay and security problems for sessions. In this paper, we point out the problems existing in the DMM and propose a new protocol in which the MN (Mobile Node) directly participates in authentication and mutual authentication is correctly performed to solve this problem. We demonstrate not only security improvements but also performance improvements with performance analysis.
Keywords
DMM (Distributed Mobility Management); CMM (Centralized Mobility Management); (BU) Binding Update; MIPv6 (Mobile IPv6); QR (Quadratic Residue);
Citations & Related Records
연도 인용수 순위
  • Reference
1 C.Perkins, D.Johnson, and J.Arkko, "Mobility support in IPv6," RFC 6275, July 2011.
2 S.Gundavelli et al., "Proxy mobile IPv6," RFC 5213, Aug 2008.
3 D.Liu and et al., "Distributed mobility management: current practices and gap analysis," RFC 7429, Jan 2015.
4 D.Dummit, E.Dummit, and H. Kisilevsky, "Characterizations of quadratic, cubic, and quartic residue matrices," Journal of Number Theory, Vol. 168, pp. 167-179, Nov. 2016.   DOI
5 M.Elia, M.Piva, and D.Schipani, "The Rabin cryptosystem revisited," Applicable Algebra in Engineering, Communication and Computing, Vol. 26, No. 3, pp. 251-275, Jun. 2015.   DOI
6 J.Lee, J.Bonnin, I.You and T. Chung, "Comparative handover performance analysis of IPv6 mobility management protocols," IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1077-1088, March. 2013.   DOI
7 Crypto++ Library 5.6.3, available at http://www.cryptopp.com/.
8 M. Chuang, J. Lee, and M. Chen, "SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks," IEEE Systems Journal, Vol. 7, No. 1, pp. 102-113, March. 2013.   DOI
9 J. Lee, "Secure authentication with dynamic tunneling in distributed IP mobility management," IEEE Wireless Communications, Vol. 23, No. 5, pp 38-43, Oct. 2016.   DOI