Anonymity and Untraceability Assessment of Authentication Protocols in Proxy Mobile IPv6

被引:0
|
作者
Alizadeh, Mojtaba [1 ]
Baharun, Sabariah [1 ]
Zamani, Mazdak [2 ]
Khodadadi, Touraj [1 ]
Darvishi, Mahdi [3 ]
Gholizadeh, Somayyeh [4 ]
Ahmadi, Hossein
机构
[1] Univ Teknol Malaysia, Malaysia Japan Int Inst Technol, Kuala Lumpur 54100, Malaysia
[2] Univ Teknol Malaysia, Adv Informat Sch, Kuala Lumpur 54100, Malaysia
[3] Univ Teknol Malaysia, Fac Comp, Johor Baharu 81310, Johor, Malaysia
[4] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Serdang 43400, Malaysia
来源
JURNAL TEKNOLOGI | 2015年 / 72卷 / 05期
关键词
Authentication; privacy evaluation; proxy Mobile IPv6; PMIPv6;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6' s performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Security Enhancement on an Authentication Method for Proxy Mobile IPv6
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ye, Ayong
    [J]. PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 345 - +
  • [2] Security Enhancement on an Authentication Method for Proxy Mobile IPv6
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ye, Ayong
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 412 - 415
  • [3] A traffic analysis of authentication methods for proxy mobile IPv6
    Lee, Jong-Hyouk
    Chung, Tai-Myoung
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 512 - 517
  • [4] An authentication method for proxy mobile IPv6 and performance analysis
    Zhou, Huachun
    Zhang, Hongke
    Qin, Yajuan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (05) : 445 - 454
  • [5] A Localized Authentication and Billing Scheme for Proxy Mobile IPv6 in VANETs
    Yeh, Lo-Yao
    Chang, Jee-Gong
    Huang, Weicheng
    Tsai, Yi-Lang
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [6] Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment
    Park, Seong-Soo
    Lee, Jong-Hyouk
    Chung, Tai-Myoung
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT I, 2009, 5592 : 885 - +
  • [7] A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6
    Lee, Jong-Hyouk
    Han, Youn-Hee
    Gundavelli, Sri
    Chung, Tai Myoung
    [J]. TELECOMMUNICATION SYSTEMS, 2009, 41 (04) : 279 - 292
  • [8] A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6
    Jong-Hyouk Lee
    Youn-Hee Han
    Sri Gundavelli
    Tai-Myoung Chung
    [J]. Telecommunication Systems, 2009, 41 : 279 - 292
  • [9] Security analysis and enhanced user authentication in proxy mobile IPv6 networks
    Kang, Dongwoo
    Jung, Jaewook
    Lee, Donghoon
    Kim, Hyoungshick
    Won, Dongho
    [J]. PLOS ONE, 2017, 12 (07):
  • [10] Security Analysis of Proxy Mobile IPv6 Authentication Protocol with IPv4 Support
    Tie, Ling
    He, Di
    [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3683 - 3687