One-way Authentication Protocol to Mobile Node in MIPv6

Author(s):  
Hoon Ko ◽  
Seonho Kim
2013 ◽  
Vol 10 (2) ◽  
pp. 913-938 ◽  
Author(s):  
Tianhan Gao ◽  
Nan Guo ◽  
Kangbin Yim

Establishing secure access and communications in a hierarchical mobile IPv6 (HMIPv6) network, when a mobile node is roaming into a foreign network, is a challenging task and has so far received little attention. Existing solutions are mainly based on public key infrastructure (PKI) or identity-based cryptography (IBC). However, these solutions suffer from either efficiency or scalability problems. In this paper, we leverage the combination of PKI and certificate-based cryptography and propose a hierarchical security architecture for the HMIPv6 roaming service. Under this architecture, we present a mutual authentication protocol based on a novel cross-certificate and certificate-based signature scheme. Mutual authentication is achieved locally during the mobile node?s handover. In addition, we propose a key establishment scheme and integrate it into the authentication protocol which can be utilized to set up a secure channel for subsequent communications after authentication. As far as we know, our approach is the first addressing the security of HMIPv6 networks using such a hybrid approach. In comparison with PKI-based and IBCbased schemes, our solution has better overall performance in terms of authenticated handover latency.


2010 ◽  
Vol E93-B (11) ◽  
pp. 2912-2924
Author(s):  
Tian HAO ◽  
Masayuki IWAI ◽  
Yoshito TOBE ◽  
Kaoru SEZAKI

2019 ◽  
Vol 15 (4) ◽  
pp. 784-794
Author(s):  
N.V. Kormil'tsev ◽  
◽  
A.D. Uvarov ◽  
A.A. Mikhailov ◽  
M.V. Tumbinskaya ◽  
...  

2019 ◽  
Vol 7 (5) ◽  
pp. 1551-1557
Author(s):  
Arif Mohammad Abdul ◽  
Sudarson Jena ◽  
M Bal Raju

2017 ◽  
Vol 9 (1) ◽  
pp. 30-35
Author(s):  
Sunderi Pranata ◽  
Hargyo Tri Nugroho ◽  
Hirofumi Yamaki

It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device (SMS, token, authenticator). Implemented in small USB U2F device, FIDO U2F delivers easier yet stronger security on authentication process which implements public key cryptography, challenge-response protocol, and phishing and MitM protection.  Index Terms— Authentication protocol, FIDO U2F, Multi factor authentication, OTP


Sign in / Sign up

Export Citation Format

Share Document