Security Analysis of Proxy Mobile IPv6 Authentication Protocol with IPv4 Support

被引:1
|
作者
Tie, Ling [1 ]
He, Di [1 ]
机构
[1] Shanghai Jiao Tong Univ, Modern Commun Inst, Shanghai 200030, Peoples R China
关键词
proxy mobile ipv6; authentication; IPv4; support; SVO; formal analysis;
D O I
10.4028/www.scientific.net/AMR.433-440.3683
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Proxy mobile ipv6 protocol is a mandatory protocol to support inter-working among heterogeneous mobile broadband networks. In order to support compatibility to IPv4 network, a mobility infrastructure in the proxy mobile ipv6 that provide ipv4 extension is presented in this article. An authentication protocol based on authentication option is proposed to protect this proxy mobile IPv6 protocol with IPv4 support. A SVO formal Analysis method is used to prove the security of this protocol.
引用
收藏
页码:3683 / 3687
页数:5
相关论文
共 50 条
  • [1] Support mobile IPv6 in IPv4 domains
    Liu, CW
    [J]. VTC2004-SPRING: 2004 IEEE 59TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, PROCEEDINGS, 2004, : 2700 - 2704
  • [2] Implementation of Route Optimization Mechanism Supporting IPv4/IPv6 Traversal in Proxy Mobile IPv6
    Jeong, Sangjin
    Shin, Myung-Ki
    Kim, Hyoung-Jun
    [J]. 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1242 - 1244
  • [3] Security Enhancement on an Authentication Method for Proxy Mobile IPv6
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ye, Ayong
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 412 - 415
  • [4] Security Enhancement on an Authentication Method for Proxy Mobile IPv6
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ye, Ayong
    [J]. PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 345 - +
  • [5] Security analysis and enhanced user authentication in proxy mobile IPv6 networks
    Kang, Dongwoo
    Jung, Jaewook
    Lee, Donghoon
    Kim, Hyoungshick
    Won, Dongho
    [J]. PLOS ONE, 2017, 12 (07):
  • [6] Security mechanisms for the IPv4 to IPv6 transition
    Taib, Abidah Hj Mat
    Budiarto, Rahmat
    [J]. 2007 5TH STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT, 2007, : 336 - +
  • [7] IPV4/IPV6 security and threat comparisons
    Durdagi, Emre
    Buldu, Ali
    [J]. INNOVATION AND CREATIVITY IN EDUCATION, 2010, 2 (02): : 5285 - 5291
  • [8] Comparisons analysis of security vulnerabilities for security enforcement in IPv4/IPv6
    Oh, H
    Chae, K
    Bang, H
    Na, J
    [J]. 8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U1583 - U1585
  • [9] Security Analysis of Session Initiation Protocol in IPv4 and IPv6 based VoIP network
    Sonwane, Ganesh Dadaji
    Chandavarkar, B. R.
    [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 187 - 192
  • [10] A traffic analysis of authentication methods for proxy mobile IPv6
    Lee, Jong-Hyouk
    Chung, Tai-Myoung
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 512 - 517