| Literature DB >> 28719621 |
Dongwoo Kang1, Jaewook Jung1, Donghoon Lee1, Hyoungshick Kim1, Dongho Won1.
Abstract
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.Entities:
Mesh:
Year: 2017 PMID: 28719621 PMCID: PMC5515433 DOI: 10.1371/journal.pone.0181031
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Network structure for PMIPv6.
Fig 2Handover of PMIPv6 with an authentication.
Notations used in this paper.
| Notations | Description |
|---|---|
| Mobile Node | |
| Mobile Access Gateway | |
| Authentication, Authorization and Accounting | |
| Identity of MN | |
| Password of MN | |
| Identity of MAG | |
| Long term Secret key of AAA | |
| The symmetric pre-shared key among the MAGs and the AAA | |
| Message M is encrypted using symmetric key | |
| One-way hash function | |
| Bio-hash function | |
| || | Concatenate operation |
| ⊕ | XOR operation |
| Shared session key between entity |
Fig 3Alizadeh et al.’s authentication scheme.
Fig 4Our proposed scheme(Registration phase).
Fig 5Our proposed scheme(Mutual authentication phase).
Comparison between proposed scheme and other similar environment scheme.
| Security Features | Chuang | Alizadeh | Our Proposed |
|---|---|---|---|
| Insider attack | No Resistance | Resistance | Resistance |
| MN anonymity | Not Satisfied | Not Satisfied | Satisfied |
| Mutual authentication | Satisfied | Satisfied | Satisfied |
| Stolen-verifier attack | Resistance | Resistance | Resistance |
| MN impersonation attack | Not Satisfied | Not Satisfied | Satisfy |
| MAG impersonation attack | Not Satisfied | Not Satisfied | Satisfy |
| Replay attack | Resistance | Resistance | Resistance |
| Denial-of-service attack | Resistance | Resistance | Resistance |
| MN password guessing attack | No Resistance | No Resistance | Resistance |
| Need Time synchronization | Not Needed | Not Needed | Not Needed |
| Free/Efficient password change | Satisfied | Satisfied | Satisfied |
Notations.
| Notations | Description |
|---|---|
| ♯( | |
|
| |
| < |
Comparison of the computational costs between the proposed scheme and other related schemes.
| Schemes | Registration | Mutual Authentication | Total |
|---|---|---|---|
| Chuang | 4 | 12 | 16 |
| Alizadeh | 4 | 10 | 14 |
| Proposed | 5 | 12 | 17 |
Simulation environment.
| Feature | Description |
|---|---|
| Operating System | 64-bits Windows 7 |
| Compiler | Visual C++ 2013 Software |
| Cryptographic Library | Crypto++ Library, 5.6.1 |
| Processor | Intel(R) Core(TM) i5-4160 CPU, 3.60GHz |
| Memory | 8.0GB |
Execution time for each operation and our scheme and other schemes.
| Operation | Execution time | Operation | Execution time |
| 0.48ms | 0.73ms | ||
| Schemes | Registration | Mutual Authentication | Total amount time |
| Chuang | 2.65ms | 10.87ms | 13.52ms |
| Alizadeh | 2.65ms | 9.91ms | 12.56ms |
| Our Proposed | 3.86ms | 11.6ms | 15.46ms |