A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks
Computer Science and Information Systems, Tome 10 (2013) no. 2
Cet article a éte moissonné depuis la source Computer Science and Information Systems website
Establishing secure access and communications in a hierarchical mobile IPv6 (HMIPv6) network, when a mobile node is roaming into a foreign network, is a challenging task and has so far received little attention. Existing solutions are mainly based on public key infrastructure (PKI) or identity-based cryptography (IBC). However, these solutions suffer from either efficiency or scalability problems. In this paper, we leverage the combination of PKI and certificate-based cryptography and propose a hierarchical security architecture for the HMIPv6 roaming service. Under this architecture, we present a mutual authentication protocol based on a novel cross-certificate and certificate-based signature scheme. Mutual authentication is achieved locally during the mobile node�s handover. In addition, we propose a key establishment scheme and integrate it into the authentication protocol which can be utilized to set up a secure channel for subsequent communications after authentication. As far as we know, our approach is the first addressing the security of HMIPv6 networks using such a hybrid approach. In comparison with PKI-based and IBC-based schemes, our solution has better overall performance in terms of authenticated handover latency.
Keywords:
hierarchical mobile IPv6, mutual authentication, identity-based cryptography, certificate-based cryptography, cross-certificate
@article{CSIS_2013_10_2_a19,
author = {Tianhan Gao and Nan Guo and Kangbin Yim},
title = {A {Hybrid} {Approach} to {Secure} {Hierarchical} {Mobile} {IPv6} {Networks}},
journal = {Computer Science and Information Systems},
year = {2013},
volume = {10},
number = {2},
url = {http://geodesic.mathdoc.fr/item/CSIS_2013_10_2_a19/}
}
Tianhan Gao; Nan Guo; Kangbin Yim. A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks. Computer Science and Information Systems, Tome 10 (2013) no. 2. http://geodesic.mathdoc.fr/item/CSIS_2013_10_2_a19/