Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2019.9.6.013

Efficient Authentication for Convergence of IoT and Mobile IP  

Lee, YunJung (Department of Computer Science and Statistics, Jeju National University)
Cho, Jungwon (Department of Computer Education, Jeju National University)
Kim, Chul-Soo (Department of Computer Science and Statistics, Jeju National University)
Lee, Bong-Kyu (Department of Computer Science and Statistics, Jeju National University)
Publication Information
Journal of Convergence for Information Technology / v.9, no.6, 2019 , pp. 13-18 More about this Journal
Abstract
This paper proposes efficient and secure two-way authentication protocol for binding update messages between mobile devices and home agents / correspondent nodes in IoT and Mobile IPv6 (MIPv6) environments with limited computing power and resources. Based on the MIPv6 message exchange, the proposed protocol satisfies both the authentication and the public key exchange optimized for both sides of the communication with minimum modification. In the future, we will carry out a performance analysis study by implementing the proposed protocol in detail.
Keywords
MIPv6; Binding; Authentication; IPSec; IKE; IoT; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Perkins, D. Johnson & J. Arkko. (2011). Mobility support in IPv6. IETF RFC 6275.
2 M. B. Yassein, S. Aljawarneh & W. Al-Sarayrah. (2017). Mobility Management of Internet of Things: Protocols, Challenges and Open Issues. IEEE ICEMIS 2017. DOI : 10.1109/ICEMIS.2017.8273021
3 J. Montavont, D. Roth & T. Noel. (2014). Mobile IPv6 in Internet of Things: Analysis, experimentations and optimizations. Ad Hoc Networks, 14, 15-25. DOI :10.1016/j.adhoc.2013.11.001   DOI
4 S. Choi & S. Koh. (2016). Use of Proxy Mobile IPv6 for Mobility Management in CoAP-based Internet-of-Things Networks. IEEE Communications Letters, 20(11), 2284-2287. DOI : 10.1109/LCOMM.2016.2601318   DOI
5 IPSec : Security Architecture for the Internet Protocol, IETF RFC 4301.
6 Internet Key Exchange (IKEv2) Protocol, IETF RFC 4306.
7 G. S. Lee. (2002). http://www.tta.or.kr/data/reportDown.jsp?news_num=549
8 G. Lee, S. Lee, J. Park & Y. Kim. Mobile IPv6 Security Issues and Solutions. http://kidbs.itfind.or.kr/WZIN/jugidong/1050/105001.htm
9 M. Chuang, J. Lee. & M. Chen. (2013). SPAM: A secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks. IEEE Systems Journal, 7(1), 102-113.   DOI
10 J. Lee. (2016). Secure authentication with dynamic tunneling in distributed IP mobility management. IEEE Wireless Communications, 23(5), 38-43.   DOI
11 G. O'shea & M. Roe. (2001). Child-proof Authentication for MIPv6 (CAM). ACM Computer Couunications Review, 31(2), 4-8.