A lightweight authentication mechanism in MIP networks
Numerous vulnerabilities threat the security of Mobile IP (MIP) networks. A variety of methods have been proposed to protect the MIP networks from the attacks. However, most of these methods are heavy and require significant time and resources. MIP is an essential element within the wireless mobile...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2016-11, Vol.9 (17), p.4272-4284 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Numerous vulnerabilities threat the security of Mobile IP (MIP) networks. A variety of methods have been proposed to protect the MIP networks from the attacks. However, most of these methods are heavy and require significant time and resources. MIP is an essential element within the wireless mobile communication network that provide a fixed IP address. Among the changes from the existing standard IP network to the MIP network, security is a most essential one. Handover delay has been increased because of the complicated authentication and registration process. Because the essential goals of MIP are to provide seamless connection and real‐time services, the security vulnerability became the biggest problem for the real deployment. To solve this problem, this paper proposes a new lightweight authentication mechanism for the authentication, authorization, and accounting (AAA) infrastructure of MIP networks. In the original AAA authentication mechanism, mobile node (MN) must wait for a nonce from an AAA server in order to generate the session key, which be used for the security associations between MN and home agent and between MN and foreign agent. This paper introduces a new mechanism, which enables the unauthenticated MN to initiate a key generation process and create a secret key in advance. This mechanism facilitates key distribution by reducing cryptographic operations (76.68% improvement) and handover time (14.15% improvement). Copyright © 2016 John Wiley & Sons, Ltd.
According to the proposed new lightweight authentication mechanism, an unauthenticated mobile node generates a valid secret key before the authentication, authorization, and accounting server verifies identities of mobile node. Therefore, while reducing the cryptographic operation time, it is possible to improve security level. As a result, resource consumption is minimized while the security of mobile node is guaranteed by the authentication mechanism of the authentication, authorization, and accounting. |
---|---|
ISSN: | 1939-0114 1939-0122 |
DOI: | 10.1002/sec.1605 |