Security and privacy criteria to evaluate authentication mechanisms in proxy mobile IPv6

Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this p...

Full description

Saved in:
Bibliographic Details
Main Authors: Alizadeh, Mojtaba, Zamani, Mazdak, Baharun, Sabariah, Hassan, Wan Haslina, Khodadadi, Touraj
Format: Article
Published: Penerbit UTM Press 2015
Subjects:
Online Access:http://eprints.utm.my/id/eprint/55388/
http://dx.doi.org/10.11113/jt.v72.3935
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this protocol, all mobility signaling procedures are completed by network entity not mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure has a key role to protect the network against different security threats; however, the details of authentication procedure is not specified in this standard. In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. The existing authentication approaches can be analyzed based on these criteria to find security issues.