| Literature DB >> 35617281 |
Fikadu Degefa1, Jihyeon Ryu2, Hyoungshick Kim2, Dongho Won2.
Abstract
Fast Proxy Mobile IPv6 (FPMIPv6) is an extension of the PMIPv6 mobility management deployed as part of the next-generation internet protocol. It allows location-independent routing of IP datagrams, based on local mobility to IPv6 hosts without involvement of stations in the IP address signaling. A mobile node keeps its IP address constant as it moves from link to link, which avoids signaling overhead and latency associated with changing IP address. Even though local mobility requirements hold, it entails security threats such as Mobile Node, Mobile Access Gateway, as well as Local Mobility Anchor impersonation that go beyond those already exist in IPv6. As mobile station keeps moving across different serving networks, its IP remains constant during handover, and location privacy may not also be preserved. Moreover, homogeneous network dependence of PMIPv6 is one of the gaps, which FPMIPv6 could not mitigate. FPMIPv6 does not support heterogeneous network handover, for which numerous researchers have proposed Media Independent Handover (MIH) enabled FPMIPv6 schemes to allow fast handover among heterogeneous networks, but in the absence of security solutions. As a comprehensive solution, we propose a new handover authentication scheme and a key agreement protocol for the 'MIH-enabled Network Only FPMIPv6' model. As one of the basic requirements, mobility management should minimize signaling overhead, handover delay and power consumption of the mobile node. The proposed scheme improves wireless link overhead (mobile node overhead) by 6-86% as cell radius, wireless failure probability and number of hop vary. The security of the proposed scheme has also been analyzed under BAN logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and its performance has numerically been evaluated through a pre-determined performance matrix and found to be effective and preferably applicable compared with other schemes.Entities:
Mesh:
Year: 2022 PMID: 35617281 PMCID: PMC9135280 DOI: 10.1371/journal.pone.0262696
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.752
Fig 1High level media independent handover architecture.
Fig 2MIH-based PMIPv6 handover scheme.
Fig 3Secure MIH enabled PMIPv6 handover protocol.
Fig 4Secure MIH enabled PMIPv6 handover protocol (continued).
Notations.
| Notations | Descriptions |
|---|---|
| Mi | |
| MN-IDi | |
| KMN-*MAG-Auth | a pre-shared authentication key between MAG and mobile node, where * stands for S: serving or C: candidate |
| MN-AAA-KEY | a shared key between mobile node AAA server |
| PBU | Proxy Binding Update |
| PBA | Proxy Binding Acknowledgement |
| HNP | Home Network Prefix |
| SMAG-ID | Serving MAG Unique identity of MAG |
| Concatenated and encrypted values under ‘x’key | |
| hash() | a one way hash function |
| K*MAG-LMA | a pre-shared authentication key between MAG and LMA, where * stands for S: serving or C: candidate |
| HMAC | hash message authentication code |
| K*MAG-AAA | shared key between MAG and AAA server,where * stands for S: serving or C: candidate |
| SQNSQN-index | a sequence captioned by index of the sequence or order of sequence |
| KIi | |
| LookUpTablei | |
| KDF | |
| CxMAG-ID | Unique identity of Candidate MAG, where x is 1,2,3……..,n assuming there would be n number of candidate MAGs |
| KMN-LMA | shared key between MN and LMA |
BAN logic notations and respective descriptions.
| Notations | Descriptions |
|---|---|
| An entity | |
| { | |
|
| |
| #( |
Fig 5Protocol execution simulation.
Fig 6Avispa verification result.
Fig 7Handover delay comparison.
Parameters list and corresponding values.
| Notations | Values | Descriptions |
|---|---|---|
|
| 7200m | City surface area length |
|
| 4800m | City surface area width |
|
| 1-50m/s | average speed of MN |
|
| 2 | Wireless signaling unit cost |
|
| 1.5 | Wired signaling unit cost |
|
| 10 | Average number of preferred MAGs |
|
| 20ms | Interfarme time |
|
| 100s | Maximum pause time in a location |
|
| 45.35ms | Maximum pause time in a location |
|
| 0.5 | Probability of failures |
|
| 20ms | Inter-frame time |
|
| 10MHz | Bandwidth |
|
| 5–20 | Intermediate hops |
|
| 5–20 | Neighboring networks |
| HMN_MAG | 10 | Distance between MN and MAG |
| HMAG_MAG | 10 | Distance between MAG and MAG |
| HMAG_LMA | 10 | Distance between MAG and LMA |
| HMAG_MIIS | 10 | Distance between MAG and MIIS |
| Dwired | 35ms | Delay over wired links |
| M1 | 16 | Route mobility management (RS) |
| M2 | 64 | Route Advertisement (RA) |
| M3 | 76 | PBU |
| M4 | 52 | PBA |
| M5 | 1500 | MIH_Get_information request |
| M6 | 1500 | MIH_Get_information response |
| M7 | 63 + 11*N+8*N*Z | MIH_Net_HO_Candidate_Query request |
| M8 | 77 + 101*N | MIH_Net_HO_Candidate_Query response |
| M9 | 75 | MIH_MN_HO_Commit request |
| M10 | 78 | MIH_MN_HO_Commit response |
| M11 | 150 + 11*N | MIH_N2N_HO_Query Resource request |
| M12 | 165 | MIH_N2N_HO_Query Resource response |
| M13 | 213 | MIH_N2N_HO_Commit request |
| M14 | 92 | MIH_N2N_HO_Commit response |
| M13 | 264 | MIH_N2N_HO_Commit request (Ext.) |
| M14 | 92 | MIH_N2N_HO_Commit response (Ext.) |
| M15 | 109 | MIH_N2N_HO_Complete request |
| M16 | 112 | MIH_N2N_HO_Complete response |
| M19 | 78 | MIH_Link_Going_down |
| M20 | 95 | MIH_Link_Up |
| M21 | 75 | MIH_AUTH_Wireless |
| M22 | 368 | MIH_AUTH_Wired |
| M23 | 152 | MIH_Net_HO_Commit request |
| M4 | 103 | MIH_Net_HO_Commit response |
| MHI | 72 | HI |
| MHack | 368 | ack |
| M25 | 196 | PROPOSED_AUTH_Wireless |
| M26 | 572 | PROPOSED_AUTH_Wired |
| M27 | 16 | L2_HO_Triggering |
Fig 8Wireless and wired total signaling cost comparison.
Fig 11Wireless failure probability vs wireless link signaling cost.
Fig 9Wireless link signaling cost comparison.
Fig 10Wireless failure probability vs wireless link signaling cost.
Security and performance comparison of handover protocols.
| Comparison Factors | FPMIPv6 | MIH-SPFP | Proposed |
|---|---|---|---|
| MN possibly be impersonated? | Yes | No | No |
| MAG possibly be impersonated? | Yes | No | No |
| LMA possibly be impersonated? | Yes | No | No |
| Can DOS be launched? | Yes | Yes | No |
| Can replay attack be launched? | Yes | No | No |
| Can Man-in-the Middle attack be launched? | Yes | No | No |
| Can Verifier Impersonation happen? | Yes | No | No |
| Is location privacy preserved? | No | No | Yes |
| Total handover Delay performance | Ranked 1 | Ranked 2 | Ranked 3 |
| Wireless link handover delay performance | Ranked 2 | Ranked 3 | Ranked 1 |
| Total signaling cost | Ranked 1 | Ranked 2 | Ranked 3 |
| Wireless link signaling cost | Ranked 2 | Ranked 3 | Ranked 1 |