2017
DOI: 10.1371/journal.pone.0181031
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis and enhanced user authentication in proxy mobile IPv6 networks

Abstract: The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…The attack that an adversary creates independent connection with the victims and sends messages between them, causing them to think that they are directly talking to each other over local mobility domain while indeed the whole conversation is manipulated by the attacker [ 32 ].…”
Section: Security Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…The attack that an adversary creates independent connection with the victims and sends messages between them, causing them to think that they are directly talking to each other over local mobility domain while indeed the whole conversation is manipulated by the attacker [ 32 ].…”
Section: Security Threatsmentioning
confidence: 99%
“…A secure password authentication mechanism for seamless handover(SPAM) [ 34 ] is proposed that executes two separate mutual authentications as One is between the MN and the MAG and the other is between the MAG and the LMA. The authors [ 32 , 37 ] analyzed and discussed that this scheme is vulnerable to the critical attacks such as stolen smart card, off-line dictionary, replay and impersonation. These researchers also discussed that an identity of MN and shared session key between MN and MAG can be leaked which may result in violation of anonymity and confidentiality requirements.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we compare the computational and communication costs for the proposed scheme with those of other related schemes for cloud computing environments. We considered the computational cost and number of 12 Wireless Communications and Mobile Computing communications occurring during the login and authentication process. As described by Kocarev and Lian [37], we consider the execution time of cryptographic operations as follows:…”
Section: Performance Analysismentioning
confidence: 99%
“…In recent years, various user authentication schemes have been proposed [8][9][10][11][12], and user authentication studies using various cryptographic primitives have been proposed to protect a user's personal information in a cloud environment. However, the investigation into such studies has revealed that the level of security is still insufficient to authenticate and manage users in the current cloud computing environment.…”
Section: Introductionmentioning
confidence: 99%
“…In [27], Kang et al proposed an enhanced user authentication scheme in PMIPv6 networks to overcome the shortcomings of the smartcard-based authentication scheme developed by Alizadeh et al [28]. Alizadeh's scheme involves three stages: i) registration phase where a user keys in its password into the smartcard that communicates with the AAA server to register; ii) mutual authentication phase where the smartcard (i.e., MN) and a MAG authenticate each other; and iii) password change phase where the user can change its password in the smartcard and repeat the process.…”
Section: Related Workmentioning
confidence: 99%