2011
DOI: 10.1002/wcm.895
|View full text |Cite
|
Sign up to set email alerts
|

Secure handover for Proxy Mobile IPv6 in next‐generation communications: scenarios and performance

Abstract: As wireless mobile network technologies have grown tremendously over the past few years, security issues of protecting user privacy and network resources have emerged. Particularly, a mobile node (MN) must be authenticated in order to utilize the network resources whenever the MN performs its initial access or handover. In this paper, we present secure handover scenarios for Proxy Mobile IPv6 (PMIPv6): namely, handover re-authentication (HORA) and handover early-authentication (HOEA). The presented secure hand… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…For the numerical analysis, we use the following system parameters obtained from the previous works [13,17]: T L2 = 45.35 ms, t MAG−MN = 12 ms, t MAG−MAG = 15 ms, and t MAG−LM A = 20 ms.…”
Section: Numerical Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…For the numerical analysis, we use the following system parameters obtained from the previous works [13,17]: T L2 = 45.35 ms, t MAG−MN = 12 ms, t MAG−MAG = 15 ms, and t MAG−LM A = 20 ms.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Even if FPMIPv6 has been well introduced how to reduce handover latency and packet loss while an MN moves different networks in the given PMIPv6 domain, it does not consider security issues. In other words, the MN must undergo its authentication procedure to have network access authorization when it attaches to a new network [2,13], but FPMIPv6 does not supply to reduce authentication latency occurred when the MN changes its access network.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, the (re)authentication latency is avoided during any handover while the EV joins a new MAG. Lee and Chung [26] proposed two secure authentication procedures for PMIPv6, but similar to Kong et al, they did not consider the handover procedure. In particular, their handover was still based on the original PMIPv6 procedure that naturally results in high handover authentication latency.…”
Section: Related Workmentioning
confidence: 99%
“…We adopt the fast handover approach of Fast Mobile IPv6 (FMIPv6) [10][11][12] to improve overall handover performance with MISP, while we develop secure handover authentication for link-layer and network-layer handovers. Note that previous studies [13][14][15][16] for secure fast handover have considered only either the link-layer handover or network-layer handover. The proposed scheme employs the idea of cross-layer security architecture that allows to exchange security credentials across different layers, e.g., link-layer and network-layer.…”
Section: Introductionmentioning
confidence: 99%