Autosoft Journal

Online Manuscript Access


An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network


Authors



Abstract

Proxy Mobile IPv6 (PMIPv6) enables local network-based mobility management for mobile node without being involved with any mobility-related signalling. However, the lack of access authentication makes PMIPv6 more vulnerable. The literature authentication schemes suffer from low efficiency and suitability. This paper presents a novel efficient authentication scheme for PMIPv6 based on a 2-level identity-based signature scheme. A mutual access authentication protocol is then achieved to eliminate the interactions between the home network and the access network for improving authentication efficiency and reducing communication cost. Moreover, the security and performance analysis demonstrate that the proposed scheme is robust and is able to provide better solution than existing ones.


Keywords


Pages

Total Pages: 8
Pages: 389-396

DOI
10.1080/10798587.2015.1126950


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 22
Issue: 3
Year: 2016

Cite this document


References

Baek J. Proc. of Australian Unix Users Group Annual Conference

Barreto, Paulo S. L. M. et al. "Efficient Algorithms for Pairing-Based Cryptosystems." Lecture Notes in Computer Science (2002): 354-369. Crossref. Web. https://doi.org/10.1007/3-540-45708-9_23

Barreto, Paulo S. L. M., Ben Lynn, and Michael Scott. "Efficient Implementation of Pairing-Based Cryptosystems." Journal of Cryptology 17.4 (2004): n. pag. Crossref. Web. https://doi.org/10.1007/s00145-004-0311-z

Choon J. C. Public key cryptography-PKC 2003

Gao T. Research Briefs on Information & Communication Technology Evolution (ReBICTE)

Gentry, Craig. "Certificate-Based Encryption and the Certificate Revocation Problem." Advances in Cryptology — EUROCRYPT 2003 (2003): 272-293. Crossref. Web. https://doi.org/10.1007/3-540-39200-9_17

Johnson D. IETF, June

Kang, Bo Gyeong, Je Hong Park, and Sang Geun Hahn. "A Certificate-Based Signature Scheme." Lecture Notes in Computer Science (2004): 99-111. Crossref. Web. https://doi.org/10.1007/978-3-540-24660-2_8

Konstantinou, Elisavet. "Efficient Cluster-Based Group Key Agreement Protocols for Wireless Ad Hoc Networks." Journal of Network and Computer Applications 34.1 (2011): 384-393. Crossref. Web. https://doi.org/10.1016/j.jnca.2010.05.001

Laat C. D. IETF

Le F. Internet IETF Draft, draft-le-aaa-diameter-mobileipv6-04

Li, H. (2008). Research on several algorithms in identity-based cryptography . PhD thesis. Electric Technology University.

Owens L. 3rd international symposium on principles and practice of programming in Java

Ryu, Seonggeun et al. "A Scheme to Reduce Packet Loss During PMIPv6 Handover Considering Authentication." 2008 International Conference on Computational Sciences and Its Applications (2008): n. pag. Crossref. Web. https://doi.org/10.1109/ICCSA.2008.23

Song, Jungwook, and Sunyoung Han. "One-Time Key Authentication Protocol for PMIPv6." 2008 Third International Conference on Convergence and Hybrid Information Technology (2008): n. pag. Crossref. Web. https://doi.org/10.1109/ICCIT.2008.86

Tian Y. Chinese Journal of Computers-Chinese Edition-

Tie, Ling, and Di He. "A Certificated-Based Binding Update Mechanism for Proxy Mobile Ipv6 Protocol." 2009 Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PrimeAsia) (2009): n. pag. Crossref. Web. https://doi.org/10.1109/PRIMEASIA.2009.5397377

Vijay, Sandip, and Subhash C. Sharma. "Threshold Signature Cryptography Scheme in Wireless Ad-Hoc Computing." Contemporary Computing (2009): 327-335. Crossref. Web. https://doi.org/10.1007/978-3-642-03547-0_31

Wang H. Journal of Shanxi Teacher’s University Natural Science Edition

Yokota, H., Chowdhury, K., Koodli, R., Patil, B. & Xia, F. (2010). Fast handovers for proxy mobile IPv6. Technical report.

Zhang L. Application Research of Computers

Guizani, Sghaier, Mustapha Razzak, and Adel Omar Dahmane, eds. Security and Communication Networks 2.5 (2009): n. pag. Crossref. Web. https://doi.org/10.1002/sec.v2:5

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present




CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/