A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks
- Authors
- Gao, Tianhan; Guo, Nan; Yim, Kangbin
- Issue Date
- Apr-2013
- Publisher
- ComSIS Consortium
- Keywords
- hierarchical mobile IPv6; mutual authentication; identity-based cryptography; certificate-based cryptography; cross-certificate
- Citation
- Computer Science and Information Systems, v.10, no.2, pp 913 - 938
- Pages
- 26
- Journal Title
- Computer Science and Information Systems
- Volume
- 10
- Number
- 2
- Start Page
- 913
- End Page
- 938
- URI
- https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/13788
- DOI
- 10.2298/CSIS121114041G
- ISSN
- 1820-0214
- Abstract
- Establishing secure access and communications in a hierarchical mobile IPv6 (HMIPv6) network, when a mobile node is roaming into a foreign network, is a challenging task and has so far received little attention. Existing solutions are mainly based on public key infrastructure (PKI) or identity-based cryptography (IBC). However, these solutions suffer from either efficiency or scalability problems. In this paper, we leverage the combination of PKI and certificate-based cryptography and propose a hierarchical security architecture for the HMIPv6 roaming service. Under this architecture, we present a mutual authentication protocol based on a novel cross-certificate and certificate-based signature scheme. Mutual authentication is achieved locally during the mobile node's handover. In addition, we propose a key establishment scheme and integrate it into the authentication protocol which can be utilized to set up a secure channel for subsequent communications after authentication. As far as we know, our approach is the first addressing the security of HMIPv6 networks using such a hybrid approach. In comparison with PKI-based and IBC-based schemes, our solution has better overall performance in terms of authenticated handover latency.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Engineering > Department of Information Security Engineering > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.