2010
DOI: 10.1155/2010/934286
|View full text |Cite
|
Sign up to set email alerts
|

Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

Abstract: Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication sche… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 19 publications
0
13
0
Order By: Relevance
“…In an one-time key authentication [16], a LMA and a MN share a time-synchronized one-time password function to authenticate each other. There is also a DiffieHellman key agreement based authentication protocol [17]. However, all of these protocols have a common inefficiency in the handover authentication procedure.…”
Section: Related Workmentioning
confidence: 99%
“…In an one-time key authentication [16], a LMA and a MN share a time-synchronized one-time password function to authenticate each other. There is also a DiffieHellman key agreement based authentication protocol [17]. However, all of these protocols have a common inefficiency in the handover authentication procedure.…”
Section: Related Workmentioning
confidence: 99%
“…For clarity of interpretation of the results, this paper does not model horizontal handovers, though it should be noted these are a real possibility that can disrupt video streams, and in [6] there is a proposal to speed-up connection set-up in WiMAX handovers. Related work on efficient key exchange during mobile roaming can be found in [15].…”
Section: Wimax Modelingmentioning
confidence: 99%
“…According to the IEEE802.16 standard, the optimized handover can skip the security sublayer operation and reuses old keys such as TEKs [1,16], or provide handover support through mobile IPv6 with other proposed schemes [6,12,19,24]. In the DiHam if the serving BS can transfer all required security keys including CSKs Cert(MS), and RS i to the target BS, the target BS can then reuse the TEKs currently employed by the serving BS without the requirements of re-calculating authentication keys and deriving current TEKs resulting in the fact that the AuthenticationReply TEK-Exchange and TEK-Reply messages can be further omitted.…”
Section: Handover Involving the Dihammentioning
confidence: 99%