Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2012.19C.2.099

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks  

Chai, Hyun-Suk (성균관대학교 정보통신공학부)
Jeong, Jong-Pil (성균관대학교 정보통신공학부)
Abstract
In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).
Keywords
FPMIPv6; CGA; AAA; BAN-logic; Security Analysis; ESS-FH;
Citations & Related Records
연도 인용수 순위
  • Reference
1 T. Aura, "Cryptographically Generated Address," RFC 3972, March, 2005.
2 T. Narten, E. Nordmark, W. Simpson, and H. Soliman, "Neighbor Discovery for IP version 6(IPv6)," RFC 4681, September, 2007.
3 J. Arkko, C. Vogt and W. Haddad, "Enhanced Route Optimization for Mobile IPv6," IETF RFC 4866, May, 2007.
4 M Burrows, M Abadi and R Needham, "A logic of authentication," ACM Trans. Comput. Syst., Vol.8, No.1, pp.18-36, February, 1990.   DOI
5 I. F. Akyildiz and W. Wang, "A dynamic location management scheme for next-generation multitier PCS systems," IEEE Trans. Wireless Commun., Vol.1, No.1, pp.178-189, January, 2002.   DOI   ScienceOn
6 Ki-Sik Kong, Youn-Hee Han, Myung-Ki Shin, HeungRyeol Yoo, and Wonjun Lee, "Mobility management for all-IP mobile networks: mobile IPv6 vs. proxy mobile IPv6," IEEE Wireless Communications, Vol.15, pp.36-45, April, 2008.   DOI   ScienceOn
7 Y. Han, J. Choi, and S. Hwang, "Reactive Handover Optimization in IPv6 Based Mobile Networks," IEEE JSAC, Vol.24, No.9, pp.1758-72, September, 2006.
8 K. S. Kong, W. Lee, Y. H. Han, M. K. Shin, "Handover Latency Analysis of a Network-based Localized Mobility Management Protocol," IEEE ICC'08, pp.5838-5843, 2008.
9 R. Koodli, "Mobile IPv6 Fast handovers," RFC 5568, July, 2009.
10 D. Johnson, C. Perkins, and J. Arkko, "Mobility support in IPv6," RFC 3775, June, 2004.
11 El. Malki, L. Bellier, "Hierarchical Mobile IPv6 Mobility Management (HMIPv6)," RFC 4140, August, 2005.
12 S. Gundavelli, K. Leung, V. Devarapalli and K. Chowdhury, "Proxy mobile IPv6," RFC 5213, August, 2008.
13 H. Yokota, K. Chowdhury and R. Koodli, "Fast handovers for Proxy Mobile IPv6," RFC 5949, September, 2010.
14 Kang, H.S., Park, C.S. "MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks," CISC 2005, Lecture Notes in Computer Science, LNCS Vol.3822, Springer-Verlag pp.407-418, 2005.
15 I. You, J. Lee, K, Sakurai, and Y.Hori, "ESS-FH:Enhanced Security for Fast Handover in Hierarchical Mobile IPv6," IEICE Tr. on Information and Systmes, Vol.E93-D, No.5, pp.1096-1105, May, 2010.   DOI   ScienceOn