2015
DOI: 10.11113/jt.v72.3936
|View full text |Cite
|
Sign up to set email alerts
|

Anonymity and Untraceability Assessment of Authentication Protocols in Proxy Mobile IPv6

Abstract: The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…This section discusses the security strengths of the authentication methods in the PMIPv6 using the assumption that smart cards are not exactly free from tampering. The suitable authentication method should fulfill some security and privacy criteria such as anonymity, mutual authentication, session key secrecy, and user unlinkability [ 10 15 ]. Furthermore, authentication schemes should secure enough against some security attacks such as session hijacking, denial of service, impersonation, replay, password guessing, man-in-the-middle, stolen-verifier, and eavesdropping attacks [ 16 24 ].…”
Section: Security Issues Of the Spam Methodsmentioning
confidence: 99%
“…This section discusses the security strengths of the authentication methods in the PMIPv6 using the assumption that smart cards are not exactly free from tampering. The suitable authentication method should fulfill some security and privacy criteria such as anonymity, mutual authentication, session key secrecy, and user unlinkability [ 10 15 ]. Furthermore, authentication schemes should secure enough against some security attacks such as session hijacking, denial of service, impersonation, replay, password guessing, man-in-the-middle, stolen-verifier, and eavesdropping attacks [ 16 24 ].…”
Section: Security Issues Of the Spam Methodsmentioning
confidence: 99%
“…However, SPAM is susceptible to the replay and malicious-insider attacks, and it does not provide protection against the compromise of a single node [ 10 ]. Also SPAM has several vulnerabilities which is susceptible to impersonation attack and password guessing attack, ignore the MAG and LMA anonymity [ 11 ]. To complement with these security drawbacks, Alizadeh et al proposed a new authentication scheme with revocation process in 2015 [ 12 ].…”
Section: Introductionmentioning
confidence: 99%
“…The security of authentication is vital because of numerous security threats. Therefore, secure authentication schemes for SIP protocol are becoming popular nowadays .…”
Section: Introductionmentioning
confidence: 99%