| Literature DB >> 26580963 |
Mojtaba Alizadeh1,2, Mazdak Zamani3, Sabariah Baharun2, Azizah Abdul Manaf4, Kouichi Sakurai1, Hiroaki Anada, Hiroki Anada5, Hassan Keshavarz2, Shehzad Ashraf Chaudhry6, Muhammad Khurram Khan7.
Abstract
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.Entities:
Mesh:
Year: 2015 PMID: 26580963 PMCID: PMC4651333 DOI: 10.1371/journal.pone.0142716
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Notations used in SPAM scheme.
| Symbol | Description |
|---|---|
|
| The AAA and LMA secret key |
|
| MN identification |
|
| AAA identification |
|
| MAG identification |
|
| Password of MN |
|
| Session key between entity (i) and entity, (j) |
|
| Message M is encrypted using key SKi-j |
|
| Message M is encrypted using key K |
|
| Nonce number i |
|
| One-way hash function |
|
| The symmetric key among the MAGs, the LMAs, and the AAA |
| ∥ | Concatenation |
| ⊕ | XOR operation |
Fig 1Initial registration procedure of SPAM method.
Fig 2The SPAM authentication procedure between the MN and the MAG.
Fig 3The authentication procedure between the MAG and the LMA.
Fig 4SPAM password change procedure.
Fig 5Registration procedure of the proposed method.
Fig 6The Proposed authentication procedure between the MN and the MAG.
Fig 7The password change procedure of the proposed method.
Comparison between proposed scheme and Chuang et al.s scheme.
| Security Feature | SPAM | Proposed scheme |
|---|---|---|
| Anonymity | No | Yes |
| Mutual authentication | Yes | Yes |
| Revocation procedure | No | Yes |
| Resistance to the MN impersonation attack | No | Yes |
| Resistance to the MAG impersonation attack | No | Yes |
| Resistance to replay attack | Yes | Yes |
| Forgery attack resistance | Yes | Yes |
| Denial-of service attack resistance | Yes | Yes |
| Resistance to password guessing attack | No | Yes |
| Stolen-verified attack resistance | No | Yes |
BAN logic notations.
|
| P see X |
|
| P believes X |
|
| P has jurisdiction over X |
|
| P once said X |
| #( | X is fresh |
|
| P and Q may use a shared key, K |
| ( | X is encrypted using, key, K |
Performance comparison between proposed scheme and SPAM.
| Criterion | Chuang | Proposed scheme |
|---|---|---|
| SC’s memory (in bit) | 6 × 128 = 768 bit | 5 × 128 = 640 bit |
| Communication cost | 9 × 128 = 1152 bit | 7 × 128 = 896 bit |
|
| ||
| Authentication (MN) | 5Thash+2Txor+3Tsym+1Tran | 4Thash+3Txor+3Tsym+1Tran |
| Authentication (MAG) | 5Thash+1Txor+4Tsym+1Tran | 3Thash+0Txor+4Tsym+1Tran |
| Total | 10Thash+3Txor+7Tsym+2Tran 0.20015 S | 7Thash+3Txor+7Tsym+2Tran |