Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Secure and Efficient Binding Update Scheme with Decentralized Design for Next Generation IP Mobility

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 324))

Abstract

Mobile Internet Protocol version 6 (MIPv6) maintains convergence for communication of mobile technologies with the ability to change their IP address. In MIPv6, a mobile device transmits location update messages which informs the current care-of address to its home agent indirectly, or to correspondent node directly, is termed as binding update. Security issues in MIPv6 are of vital significance, and the binding update messages must be secured against any malicious attacks that might attempt to get unauthorized access from the participating entities. This paper improves binding update scheme using optimal asymmetric encryption, which enhances security without relying on a third party. The proposed scheme achieves mutual authentication between the communicants and significant reduction in computational cost. The scheme is simulated and validated using the security tool AVISPA. Also, mitigation for various malicious attacks, such as replay attack, man-in-the-middle attack, and false binding update attack, have been addressed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. K. Elgoarany, M. Eltoweissy, Security in mobile IPv6.: a survey. Inf. Secur. Tech. Rep. 12(1), 32–43 (2007)

    Article  Google Scholar 

  2. J. Guan, I. You, C. Xu, H. Zhou, H. Zhang, Survey on route optimization schemes for proxy mobile IPv6, in 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE (2012), pp. 541–546

    Google Scholar 

  3. H. Modares, A. Moravejosharieh, J. Lloret, R. Salleh, A survey of secure protocols in mobile IPv6. J. Netw. Comput. Appl. (2013)

    Google Scholar 

  4. S.K. Mathi, M.L. Valarmathi, A secure and decentralized registration scheme for IPv6 network-based mobility. Int. J. Eng. Technol. 5(5) (2013)

    Google Scholar 

  5. W.A.A. Alsalihy, M.S.S. Alsayfi, Integrating identity-based encryption in the return routability protocol to enhance signal security in mobile IPv6. Wirel. Pers. Commun. 68(3), 655–669 (2013)

    Article  Google Scholar 

  6. H. Modares, R. Salleh, A. Moravejosharieh, H. Malakootikhah, Securing binding update in mobile IPv6 using private key base binding update protocol (2012)

    Google Scholar 

  7. L.Y. Yeh, C.C. Yang, J.G. Chang, Y.L. Tsai, A secure and efficient batch binding update scheme for route optimization of nested network mobility in VANETs. J. Netw. Comput. Appl. 36(1), 284–292 (2013)

    Article  Google Scholar 

  8. J. Liu, J. Li, A novel key exchange protocol based on RSA-OAEP, in 10th International Conference on Advanced Communication Technology, ICACT 2008 (2008), p. 3

    Google Scholar 

  9. S. Qadir, M.U. Siddiqi, Cryptographically generated addresses (CGAs): a survey and an analysis of performance for use in mobile environment. IJCSNS Int. J. Comput. Sci. Netw. Secur. 11(2), 24–31 (2011)

    Google Scholar 

  10. C. Castellucia, G. Montenegro, Securing group management in IPv6 with cryptographically generated addresses, in 8thIEEE International Symposium Computers and Communication (2003), pp. 588–593

    Google Scholar 

  11. S. Sehwa, C. Hyoung-Kee, K. Jung-Yoon, A secure and lightweight approach for routing optimization in mobile IPv6. EURASIP J. Wirel. Commun. Netw. (2009)

    Google Scholar 

  12. Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In Computer Aided Verification. (2005) 281-285

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Senthil Kumar Mathi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Mathi, S.K., Valarmathi, M.L., Srilakshmy (2015). A Secure and Efficient Binding Update Scheme with Decentralized Design for Next Generation IP Mobility. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_47

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2126-5_47

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2125-8

  • Online ISBN: 978-81-322-2126-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics