DOI QR코드

DOI QR Code

Authentication eXtention Scheme of Fast Handover for Secure NEMO-based PMIPv6 Networks

안전한 NEMO 기반 PMIPv6 네트워크를 위한 빠른 핸드오버를 지원하는 확장 인증기법

  • 임일균 (성균관대학교 정보통신대학원 컴퓨터공학과) ;
  • 정종필 (성균관대학교 정보통신대학)
  • Received : 2013.09.22
  • Accepted : 2013.10.11
  • Published : 2013.10.31

Abstract

This paper reinforced security under the network evaluation of wire wireless integration of NEMO (NEwork MObility) supporting mobility and network-based PMIPv6 (Proxy Mobile IPv6). It also proposes $SK-L^2AS$ (Symmetric Key-Based Local-Lighted Authentication Scheme) based on simple key which reduces code calculation and authentication delay costs. Moreover, fast handover technique was also adopted to reduce handover delay time in PMIPv6 and X-FPMIPv6 (eXtension of Fast Handover for PMIPv6) was used to support global mobility. In addition, AX-FPMIPv6 (Authentication eXtension of Fast Handover for PMIPv6) is proposed which integrated $SK-L^2AS$ and X-FPMIPv6 by applying Piggybacks method to reduce the overhead of authentication and signaling. The AX-FPMIPv6 technique suggested in this paper shows that this technique is better than the existing schemes in authentication and handover delay according to the performance analysis.

본 논문에서는 이동성을 지원하는 NEMO(NEwork MObility)와 네트워크 기반의 PMIPv6(Proxy Mobile IPv6)가 결합된 유 무선 통합 네트워크 환경에서 보안을 강화하고 암호계산과 인증지연 비용을 줄이는 가벼운 키 베이스의 $SK-L^2AS$(Symmetric Key-Based Light-Local Authentication Scheme)인증기법을 제안한다. 또한 PMIPv6에서 핸드오버 지연 단축을 위해 빠른 핸드오버 기법을 적용하였고, 지원되지 않는 전역 이동성을 지원하기 위해 X-FPMIPv6(eXtension of Fast Handover for PMIPv6)으로 확장 개선하였다. 더불어, 인증과 시그널링의 신호 부담을 줄이기 위해서 Piggybacks 방식을 적용하여 SK-L2AS과 X-FPMIPv6을 통합한 AX-FPMIPv6 (Authentication eXtension of Fast Handover for PMIPv6)을 제안한다. 본 논문에서 제안한 AX-FPMIPv6 기법은 성능분석 결과 인증과 핸드오버 지연에서 기존 기법에 비해 성능이 우수하다는 것을 보여준다.

Keywords

References

  1. V. Devarapalli, R. Wakikawa, A. Petrescu, P. Thubert, "Network Mo bility(NEMO) Basic Support Protocol ", IETF, RFC 3963, January 2005.
  2. D. Johnson, C. Perkins, J. Arkko, "Mobility support in IPv6", IETF, RFC 3775, June 2004.
  3. L. Lamport, "Password authentication with insecure communication", Communications of the ACM, Vol. 24 (11), pp.770-772, November 1981. https://doi.org/10.1145/358790.358797
  4. T. Narten, E. Nordmark, W. Simpson. "Neighbor discovery for IP version 6 (IPv6)", RFC 2461, December 1998.
  5. S. Pack, Y. Choi, "Fast handoff scheme based on mobility prediction in public wireless LAN systems", IEEE Communications, Vol.151(5), pp.489 -495, October 2004. https://doi.org/10.1049/ip-com:20040834
  6. A. Mishra, M.H. Shin, N.L. Petroni, J.T. Clancy, W.A. Arbauch, "Proactive key distribution using neighbor graphs", IEEE Wireless Communications, Vol.11(1), pp.26-36, February 2004. https://doi.org/10.1109/MWC.2004.1269714
  7. C. de Laat, G. Gross, L. Gommans, J. Vollbrecht, D. Spence, "Generic AAA architecture", IETF, RFC 2903, August 2000.
  8. S. Glass, T. Hiller, S. Jacobs, C. Perkins, "Mobile IP authentication, authorization, and accounting requirements", IETF, RFC 2977, October 2000.
  9. C.E Perkins, "Mobile IP joins forces with AAA", IEEE Personal Communications, RFC 2977, pp.59- 61, August 2000.
  10. P. Calhoun, T. Johansson, C. Perkins, T. Hiller, "Diameter Mobile IPv4 application", P. McCann (Ed.), RFC 4004, August 2005.
  11. H. Fathi, S. Shin, K. Kobara, S. Chakraborty, H. Imai, R. Prasad, "LRAKE-based AAA for network mobility (NEMO) over wireless links", IEEE Journal on Selected Areas in Communications (JSAC), Vol.24(9), pp.1725-1737, 2006. https://doi.org/10.1109/JSAC.2006.875111
  12. I. Hideki, S. Seonghan, K. Kanukuni, "introduction to Leakage-Resilient Authenticated Key Exchanged Protocols and Their Applications", KIISC, December 2008.
  13. Yingjie Wang, Wei Luo, Changxiang Shen, "Analysis on Imai-Shin's LR-AKE protocol for wireless network security", Communications in Computer and Information Science, Vol.84-89, 2009.
  14. Ming-Chin Chubng, Jeng-Farn Lee, "A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks" Computer Networks, June 2011.
  15. Depeng Li, Srinivas Sampalli, "An efficient contributory group rekeying scheme based on hash functions for MANETs", IFIP International Conference on Network and Parallel Computing Workshops, pp.191-198, September 2007.
  16. W.H.D. Ng, Zhili Sun, H. Cruickshank, "Group key management with network mobility", 13th IEEE International Conference on Networks (ICON), Vol. 2, pp.716-721, November 2005.
  17. Y. Kim, A. Perrig, G. Tfsudik, "Group key agreement efficient in communication", IEEE transactions on computers, Vol. 53(7) PP.905-921, 2004.
  18. K. El Malki (Ed.), "Low-Latency Handoffs in Mobile IPv4", IETF, RFC 4881, June 2007.
  19. R. Koodli (Ed.), "Fast Handoffs for Mobile IPv6", IETF, RFC 5268, June 2008.
  20. P. McCann, "Mobile IPv6 fast handoffs for 802.11 Networks", IETF, RFC 4260, November 2005.
  21. S. Gundaveli, K, Leung, V. Devarapali, K. Chowdhury, and B. Patil, "Proxy Mobile IPv6", IETF, RFC 5213, August 2008.
  22. G, Giaretta, "Interaction between PMIPv6 and MIPv6", draft-ietfnet lmm-mip-interactions-03.txt, November, 2009.
  23. Jee-Hyeon Na, Soochang Park, Jung-Mo Moon, Sangho Lee, Euisin Lee, and Sang-Ha Kim, "Roaming Mechanism between PMIPv6 Domain ",draft-park-netmm-pmipv6-roaming-o1.txt, July, 2008.
  24. Yuh-Shyan Chen, Ming-Chin Chuang, Chung-Kai Chen, "DeuceScan: deuce-based fast handoff scheme in IEEE 802.11 wireless networks",IEEE Transaction on Vehicular Technology Conference, Vol. 57(2), pp.1126-1141, September 2008.
  25. NIST, U.S. Department of Commerce, "Secure Hash Standard", U.S.Federal Information Processing Standard (FIPS), August 2002.
  26. Ki-Sik Kong, Wonjun Lee, Youn-Hee Han, Myung-Ki Shin,HeungRyeol You, "Mobility management for All-IP mobile networks: Mobile IPv6 vs. proxy mobile IPv6", IEEE Wireless Communications, Vol. 15(2), pp.36-45, 2008. https://doi.org/10.1109/MWC.2008.4492976
  27. S. Thomson, T. Narten, "IPv6 stateless address autoconfiguration", IETF, RFC 2462, December 1998.
  28. I. Im, YH Cho, JY Choi, J. Jeong "Security-Effective fast authentication mechanism for network mobility in proxy mobile IPv6 networks", Computational Science and Its Applications-ICCSA 2012, Vol.7336, pp.543-559, 2012.
  29. I. Im, J. Jeong, "Cost-effective and fast handoff scheme in Proxy Mobile IPv6 networks with multicasting support", Mobile Information Systems, IOS Press, July 2013.
  30. E.J. Lee, P.J. Lee, "Multul Authentication and Session Key Agreement Protocol Using only a Hash Function", Vol.7 No. 1, KIISC, 1997
  31. W. Diffie and M.E.Hellman, "New Directions in Cryptography", IEEE Transaction of Information Theory, IT-22, 6, pp.644-654, 1976
  32. S. Jang, J. Jeong, "Cost-Effective and Distributed Mobility Management Scheme in Sensor-Based PMIPv6 Network with SPIG Support", JIWIT, August, August 2012.