Abstract
Technology advances—such as improving processing power, battery life, and communication functionalities—contribute to making mobile devices an attractive research area. In 2008, in order to manage mobility, the Internet Engineering Task Force (IETF) developed Proxy Mobile IPv6, which is a network-based mobility management protocol to support seamless connectivity of mobile devices. This protocol can play a key role in volunteer computing paradigms as a user can seamlessly access computing resources. The procedure of user authentication is not defined in this standard; thus, many studies have been carried out to propose suitable authentication schemes. However, in the current authentication methods, with reduced latency and packet loss, some security and privacy considerations are neglected. In this study, we propose a secure and anonymous ticket-based authentication (SATA) method to protect mobile nodes against existing security and privacy issues. The proposed method reduces the overhead of handover authentication procedures using the ticket-based concept. We evaluated security and privacy strengths of the proposed method using security theorems and BAN logic.
- T. M. Mengistu and D. Che. 2019. Survey and taxonomy of volunteer computing. ACM Computing Surveys (CSUR) 52, 3 (2019), 1–35. Google Scholar
Digital Library
- M. Nouman Durrani and J. A. Shamsi. 2014. Volunteer computing: Requirements, challenges, and solutions. Journal of Network and Computer Applications 39, 369–380. Google Scholar
Digital Library
- S. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury, B. Patil, and K. Leung. 2008. Proxy Mobile IPv6, RFC 5213, Internet Engineering Task Force, 2008, 1–92.Google Scholar
- Q. Jiang, J. Ma, G. Li, and A. Ye. 2012. Security enhancement on an authentication method for Proxy Mobile IPv6. Proceedings of the International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE’11), November 19–20, 2011, Melbourne, Australia, Advances in Intelligent and Soft Computing, L. Jiang, ed., 345–352: Springer, Berlin.Google Scholar
- K. Ki-Sik, L. Wonjun, H. Youn-Hee, S. Myung-Ki, and Y. HeungRyeol. 2008. Mobility management for All-IP mobile networks: Mobile IPv6 vs. Proxy Mobile IPv6. IEEE Wireless Communications 15, 2 (2008), 36–45. Google Scholar
Digital Library
- M.-S. Chiang, C.-M. Huang, D.-T. Dao, and B.-C. Pham. 2018. The backward fast media independent handover for Proxy Mobile IPv6 control scheme (BFMIH-PMIPV6) over heterogeneous wireless mobile networks. Journal of Information Science and Engineering 34, 3 (2018), 765–780.Google Scholar
- N. Haller. 1995. The S/KEY one-time password system. RFC1760, Internet Engineering Task Force, (1995). Google Scholar
Digital Library
- L. Lamport. 1981. Password authentication with insecure communication. Communications of the ACM 24, 11 (1981), 770–772. Google Scholar
Digital Library
- S. A. Chaudhry, M. S. Farash, H. Naqvi, S. Kumari, and M. K. Khan. 2015. An enhanced privacy preserving remote user authentication scheme with provable security. Security and Communication Networks, (2015), 3782--3795. Google Scholar
Digital Library
- M.-S. Hwang and L.-H. Li. 2000. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46, 1 (2000), 28–30. Google Scholar
Digital Library
- S.-W. Lee, H.-S. Kim, and K.-Y. Yoo. 2005. Improvement of Chien et al.’s remote user authentication scheme using smart cards. Computer Standards & Interfaces 27, 2 (2005), 181–183.Google Scholar
Cross Ref
- M. L. Das, A. Saxena, and V. P. Gulati. 2004. A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50, 2 (2004), 629–631. Google Scholar
Digital Library
- H.-M. Chen, J.-W. Lo, and C.-K. Yeh. 2012. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. Journal of Medical Systems 36, 6 (2012), 3907–3915. Google Scholar
Digital Library
- M. Alizadeh, M. Zamani, S. Baharun, W. H. Hassan, and T. Khodadadi. 2015. Security and privacy criteria to evaluate authentication mechanisms in Proxy Mobile IPv6. Jurnal Teknologi 72, 5 (2015), 27–30.Google Scholar
Cross Ref
- M. Alizadeh, S. Baharun, M. Zamani, T. Khodadadi, M. Darvishi, S. Gholizadeh, and H. Ahmadi. 2015. Anonymity and untraceability assessment of authentication protocols in Proxy Mobile IPv6. Jurnal Teknologi 72, 5 (2015), 31–34.Google Scholar
Cross Ref
- A. Mohammadali, M. S. Haghighi, M. H. Tadayon, and A. Mohammadi-Nodooshan. 2018. A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Transactions on Smart Grid 9, 4 (2018), 2834–2842.Google Scholar
Cross Ref
- J.-H. Lee and J.-M. Bonnin. 2013. HOTA: Handover optimized ticket-based authentication in network-based mobility management. Information Sciences 230, 0 (2013), 64–77. Google Scholar
Digital Library
- C. Ming-Chin, L. Jeng-Farn, and C. Meng-Chang. 2013. SPAM: A secure password authentication mechanism for seamless handover in Proxy Mobile IPv6 networks. IEEE Systems Journal 7, 1 (2013), 102–113.Google Scholar
Cross Ref
- M.-C. Chuang and J.-F. Lee. 2013. SF-PMIPv6: A secure fast handover mechanism for Proxy Mobile IPv6 networks. Journal of Systems and Software 86, 2 (2013), 437–448. Google Scholar
Digital Library
- M. Alizadeh, M. Zamani, S. Baharun, A. Abdul Manaf, K. Sakurai, H. Anada, H. Keshavarz, S. Ashraf Chaudhry, and M. Khurram Khan. 2015. Cryptanalysis and improvement of a secure password authentication mechanism for seamless handover in Proxy Mobile IPv6 networks. PLoS ONE 10, 11 (2015), e0142716.Google Scholar
Cross Ref
- M. Wang and J. Pan. 2014. RFID authentication protocol design via BAN logic. Journal of Chemical and Pharmaceutical Research 6, 7 (2014), 708–717.Google Scholar
- M. Alkatheiri, M. Eldefrawy, and M. Khan. 2012. BAN logic-based security proof for mobile OTP authentication scheme. Future Information Technology, Application, and Service, Lecture Notes in Electrical Engineering, J. J. Park, V. C. M. Leung, C.-L. Wang and T. Shon, eds. 53—59, Springer, the Netherlands, 2012.Google Scholar
- W. Teepe. 2009. On BAN logic and hash functions or: How an unjustified inference rule causes problems. Autonomous Agents and Multi-Agent Systems 19, 1 (2009), 76–88. Google Scholar
Digital Library
- J. Wessels and B. V. Finance. 2001. Application of BAN-Logic, 19 April [online] http://htwww.win.tue.nl/ipa/archive/springdays2001/banwessels.pdf (accessed 07 May 2017).Google Scholar
- W.-B. Hsieh and J.-S. Leu. 2014. Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks. Wireless Communications and Mobile Computing 14, 10 (2014), 995–1006.Google Scholar
Cross Ref
- D. He, Y. Zhang, and J. Chen. 2014. Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications 74, 2 (2014), 229–243. Google Scholar
Digital Library
- C.-T. Li, M.-S. Hwang, and Y.-P. Chu. 2008. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications 31, 12 (2008), 2803–2814, 7/30/. Google Scholar
Digital Library
- S. Chaudhry, H. Naqvi, T. Shon, M. Sher, and M. Farash. 2015. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. Journal of Medical Systems 39, 6 (2015), 1–11. Google Scholar
Digital Library
- S. Chaudhry, H. Naqvi, M. Sher, M. Farash, and M. Hassan. 2015. An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Networking and Applications 1–15, (2015).Google Scholar
- N. Koblitz, A. Menezes, and S. Vanstone. 2000. The state of elliptic curve cryptography. In Towards a Quarter-Century of Public Key Cryptography, N. Koblitz, ed., 103–123, Springer, New York, (2000).Google Scholar
Index Terms
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing
Recommendations
Empirical performance evaluation of IETF mobile IPv6 and proxy mobile IPv6
Mobility '08: Proceedings of the International Conference on Mobile Technology, Applications, and SystemsWith the rapid growth in the number of mobile subscribers and mobile devices, the demand high-speed Internet access is becoming a primary concern in our lives. Not long ago, the most stable and well known solution of IP-based mobility management is ...
An Authentication Protocol for Proxy Mobile IPv6
MSN '08: Proceedings of the 2008 The 4th International Conference on Mobile Ad-hoc and Sensor NetworksProxy Mobile IPv6 is a network-based mobility protocol where the mobility management signaling is performed by a network entity on behalf of the node requiring mobility itself. To the best of our knowledge, no studies have been conducted in the area of ...
Inter-domain mobility support in Proxy Mobile IPv6 using overlap function of mobile access gateway
In a single local mobility domain of Proxy Mobile IPv6 (PMIPv6) the mobile node (MN) uses only its PMIPv6 home address for all its communication. When the MN moves into another domain, the MN must change its PMIPv6 home address and host-based mobility ...






Comments