Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6

The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is n...

Full description

Saved in:
Bibliographic Details
Main Authors: Alizadeh, Mojtaba, Baharun, Sabariah, Zamani, Mazdak, Khodadadi, Touraj, Darvishi, Mahdi, Gholizadeh, Somayyeh, Ahmadi, Hossein
Format: Article
Language:English
Published: Penerbit UTM Press 2015
Subjects:
Online Access:http://eprints.utm.my/id/eprint/57828/1/SabariahBaharun2015_AnonymityandUntraceabilityAssessmentofAuthenticationProtocols.pdf
http://eprints.utm.my/id/eprint/57828/
http://dx.doi.org/10.11113/jt.v72.3936
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.57828
record_format eprints
spelling my.utm.578282021-12-06T03:13:41Z http://eprints.utm.my/id/eprint/57828/ Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6 Alizadeh, Mojtaba Baharun, Sabariah Zamani, Mazdak Khodadadi, Touraj Darvishi, Mahdi Gholizadeh, Somayyeh Ahmadi, Hossein T Technology (General) The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms. Penerbit UTM Press 2015 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/57828/1/SabariahBaharun2015_AnonymityandUntraceabilityAssessmentofAuthenticationProtocols.pdf Alizadeh, Mojtaba and Baharun, Sabariah and Zamani, Mazdak and Khodadadi, Touraj and Darvishi, Mahdi and Gholizadeh, Somayyeh and Ahmadi, Hossein (2015) Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6. Jurnal Teknologi, 72 (5). pp. 31-34. ISSN 0127-9696 http://dx.doi.org/10.11113/jt.v72.3936 DOI:10.11113/jt.v72.3936
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic T Technology (General)
spellingShingle T Technology (General)
Alizadeh, Mojtaba
Baharun, Sabariah
Zamani, Mazdak
Khodadadi, Touraj
Darvishi, Mahdi
Gholizadeh, Somayyeh
Ahmadi, Hossein
Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
description The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms.
format Article
author Alizadeh, Mojtaba
Baharun, Sabariah
Zamani, Mazdak
Khodadadi, Touraj
Darvishi, Mahdi
Gholizadeh, Somayyeh
Ahmadi, Hossein
author_facet Alizadeh, Mojtaba
Baharun, Sabariah
Zamani, Mazdak
Khodadadi, Touraj
Darvishi, Mahdi
Gholizadeh, Somayyeh
Ahmadi, Hossein
author_sort Alizadeh, Mojtaba
title Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
title_short Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
title_full Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
title_fullStr Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
title_full_unstemmed Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
title_sort anonymity and untraceability assessment of authentication protocols in proxy mobile ipv6
publisher Penerbit UTM Press
publishDate 2015
url http://eprints.utm.my/id/eprint/57828/1/SabariahBaharun2015_AnonymityandUntraceabilityAssessmentofAuthenticationProtocols.pdf
http://eprints.utm.my/id/eprint/57828/
http://dx.doi.org/10.11113/jt.v72.3936
_version_ 1718926021322866688
score 13.15806