{"title":"An Authentication Protocol for Proxy Mobile IPv6","authors":"Huachun Zhou, Hongke Zhang","doi":"10.1109/MSN.2008.27","DOIUrl":null,"url":null,"abstract":"Proxy Mobile IPv6 is a network-based mobility protocol where the mobility management signaling is performed by a network entity on behalf of the node requiring mobility itself. To the best of our knowledge, no studies have been conducted in the area of Proxy Mobile IPv6 authentication method. This paper proposes an authentication method in Proxy Mobile IPv6. In addition to providing access authentication, the proposed authentication method prevents threats such as replay attack and key exposure. Also, we develop analytic models for the authentication latency and cost analysis. Then, the impacts of mobility and traffic parameters on the authentication cost and latency are analyzed, respectively.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MSN.2008.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
Proxy Mobile IPv6 is a network-based mobility protocol where the mobility management signaling is performed by a network entity on behalf of the node requiring mobility itself. To the best of our knowledge, no studies have been conducted in the area of Proxy Mobile IPv6 authentication method. This paper proposes an authentication method in Proxy Mobile IPv6. In addition to providing access authentication, the proposed authentication method prevents threats such as replay attack and key exposure. Also, we develop analytic models for the authentication latency and cost analysis. Then, the impacts of mobility and traffic parameters on the authentication cost and latency are analyzed, respectively.