A scalable and practical authentication protocol in mobile IP

被引:0
|
作者
Lee, Yong [2 ]
Lee, Goo-Yeon [1 ]
Kim, Hwa-Jong [1 ]
机构
[1] Kangwon Natl Univ, Dept Elect & Comp Engn, Kangwon Do, South Korea
[2] Chungju Natl Univ, Dept Elect Commun Engn, ChungcheongBuk Do, South Korea
关键词
authentication; public key; mobile IP; certificate; scalability;
D O I
10.1093/ietcom/e91-b.2.601
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the proliferation of mobile devices connected to the Internet, implementing a secure and practical Mobile IP has become an important goal. A mobile IP can not work properly without authentication between the mobile node (MN), the home agent (HA) and the foreign agent (FA). In this paper, we propose a practical Mobile IP authentication protocol that uses public key cryptography only during the initial authentication. The proposed scheme is compatible with the conventional Mobile IP protocol and provides scalability against the number of MN's. We also show that the proposed protocol offers secure operation.
引用
收藏
页码:601 / 604
页数:4
相关论文
共 50 条
  • [1] Design and performance evaluation of a scalable authentication protocol in mobile IP
    Lee, Yong
    Lee, Goo Yeon
    Kim, Hwa Jong
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 1029 - +
  • [2] Evaluation of mobile IP fast authentication protocol compared to hierarchical mobile IP
    Diab, A
    Mitschele-Thiel, A
    Böringer, R
    WiMob'2005: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Vol 2, Proceedings: MOBILE NETWORKING, 2005, : 9 - 16
  • [3] Performace Analysis of authentication method for Proxy Mobile IP protocol
    Tie Ling
    He Di
    Li Jian Hua
    Tang Jun Hua
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 2048 - 2051
  • [4] Authentication and payment protocol preserving location privacy in mobile IP
    Choi, S
    Kim, K
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1410 - 1414
  • [5] Scalable Multicast Protocol in IP-Based Mobile Networks
    Chunhung Richard Lin
    Kai-Min Wang
    Wireless Networks, 2002, 8 : 27 - 36
  • [6] Scalable multicast protocol in IP-based mobile networks
    Lin, CR
    Wang, KM
    WIRELESS NETWORKS, 2002, 8 (01) : 27 - 36
  • [7] A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices
    Chen, Chien-Ming
    Wang, King-Hang
    Wu, Tsu-Yang
    Pan, Jeng-Shyang
    Sun, Hung-Min
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1318 - 1330
  • [8] LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) protocol for Mobile IP
    Chenait, Manel
    GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 228 - 238
  • [9] A scalable and untraceable authentication protocol for RFID
    Seo, Youngjoon
    Lee, Hyunrok
    Kim, Kwangjo
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 252 - 261
  • [10] Secure and Scalable RFID Authentication Protocol
    Fernandez-Mir, Albert
    Castella-Roca, Jordi
    Viejo, Alexandre
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 : 231 - 243