skip to main content
research-article

A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing

Authors Info & Claims
Published:22 July 2021Publication History
Skip Abstract Section

Abstract

Technology advances—such as improving processing power, battery life, and communication functionalities—contribute to making mobile devices an attractive research area. In 2008, in order to manage mobility, the Internet Engineering Task Force (IETF) developed Proxy Mobile IPv6, which is a network-based mobility management protocol to support seamless connectivity of mobile devices. This protocol can play a key role in volunteer computing paradigms as a user can seamlessly access computing resources. The procedure of user authentication is not defined in this standard; thus, many studies have been carried out to propose suitable authentication schemes. However, in the current authentication methods, with reduced latency and packet loss, some security and privacy considerations are neglected. In this study, we propose a secure and anonymous ticket-based authentication (SATA) method to protect mobile nodes against existing security and privacy issues. The proposed method reduces the overhead of handover authentication procedures using the ticket-based concept. We evaluated security and privacy strengths of the proposed method using security theorems and BAN logic.

References

  1. T. M. Mengistu and D. Che. 2019. Survey and taxonomy of volunteer computing. ACM Computing Surveys (CSUR) 52, 3 (2019), 1–35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Nouman Durrani and J. A. Shamsi. 2014. Volunteer computing: Requirements, challenges, and solutions. Journal of Network and Computer Applications 39, 369–380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury, B. Patil, and K. Leung. 2008. Proxy Mobile IPv6, RFC 5213, Internet Engineering Task Force, 2008, 1–92.Google ScholarGoogle Scholar
  4. Q. Jiang, J. Ma, G. Li, and A. Ye. 2012. Security enhancement on an authentication method for Proxy Mobile IPv6. Proceedings of the International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE’11), November 19–20, 2011, Melbourne, Australia, Advances in Intelligent and Soft Computing, L. Jiang, ed., 345–352: Springer, Berlin.Google ScholarGoogle Scholar
  5. K. Ki-Sik, L. Wonjun, H. Youn-Hee, S. Myung-Ki, and Y. HeungRyeol. 2008. Mobility management for All-IP mobile networks: Mobile IPv6 vs. Proxy Mobile IPv6. IEEE Wireless Communications 15, 2 (2008), 36–45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M.-S. Chiang, C.-M. Huang, D.-T. Dao, and B.-C. Pham. 2018. The backward fast media independent handover for Proxy Mobile IPv6 control scheme (BFMIH-PMIPV6) over heterogeneous wireless mobile networks. Journal of Information Science and Engineering 34, 3 (2018), 765–780.Google ScholarGoogle Scholar
  7. N. Haller. 1995. The S/KEY one-time password system. RFC1760, Internet Engineering Task Force, (1995). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. Lamport. 1981. Password authentication with insecure communication. Communications of the ACM 24, 11 (1981), 770–772. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. A. Chaudhry, M. S. Farash, H. Naqvi, S. Kumari, and M. K. Khan. 2015. An enhanced privacy preserving remote user authentication scheme with provable security. Security and Communication Networks, (2015), 3782--3795. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M.-S. Hwang and L.-H. Li. 2000. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46, 1 (2000), 28–30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S.-W. Lee, H.-S. Kim, and K.-Y. Yoo. 2005. Improvement of Chien et al.’s remote user authentication scheme using smart cards. Computer Standards & Interfaces 27, 2 (2005), 181–183.Google ScholarGoogle ScholarCross RefCross Ref
  12. M. L. Das, A. Saxena, and V. P. Gulati. 2004. A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50, 2 (2004), 629–631. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H.-M. Chen, J.-W. Lo, and C.-K. Yeh. 2012. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. Journal of Medical Systems 36, 6 (2012), 3907–3915. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Alizadeh, M. Zamani, S. Baharun, W. H. Hassan, and T. Khodadadi. 2015. Security and privacy criteria to evaluate authentication mechanisms in Proxy Mobile IPv6. Jurnal Teknologi 72, 5 (2015), 27–30.Google ScholarGoogle ScholarCross RefCross Ref
  15. M. Alizadeh, S. Baharun, M. Zamani, T. Khodadadi, M. Darvishi, S. Gholizadeh, and H. Ahmadi. 2015. Anonymity and untraceability assessment of authentication protocols in Proxy Mobile IPv6. Jurnal Teknologi 72, 5 (2015), 31–34.Google ScholarGoogle ScholarCross RefCross Ref
  16. A. Mohammadali, M. S. Haghighi, M. H. Tadayon, and A. Mohammadi-Nodooshan. 2018. A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Transactions on Smart Grid 9, 4 (2018), 2834–2842.Google ScholarGoogle ScholarCross RefCross Ref
  17. J.-H. Lee and J.-M. Bonnin. 2013. HOTA: Handover optimized ticket-based authentication in network-based mobility management. Information Sciences 230, 0 (2013), 64–77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Ming-Chin, L. Jeng-Farn, and C. Meng-Chang. 2013. SPAM: A secure password authentication mechanism for seamless handover in Proxy Mobile IPv6 networks. IEEE Systems Journal 7, 1 (2013), 102–113.Google ScholarGoogle ScholarCross RefCross Ref
  19. M.-C. Chuang and J.-F. Lee. 2013. SF-PMIPv6: A secure fast handover mechanism for Proxy Mobile IPv6 networks. Journal of Systems and Software 86, 2 (2013), 437–448. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Alizadeh, M. Zamani, S. Baharun, A. Abdul Manaf, K. Sakurai, H. Anada, H. Keshavarz, S. Ashraf Chaudhry, and M. Khurram Khan. 2015. Cryptanalysis and improvement of a secure password authentication mechanism for seamless handover in Proxy Mobile IPv6 networks. PLoS ONE 10, 11 (2015), e0142716.Google ScholarGoogle ScholarCross RefCross Ref
  21. M. Wang and J. Pan. 2014. RFID authentication protocol design via BAN logic. Journal of Chemical and Pharmaceutical Research 6, 7 (2014), 708–717.Google ScholarGoogle Scholar
  22. M. Alkatheiri, M. Eldefrawy, and M. Khan. 2012. BAN logic-based security proof for mobile OTP authentication scheme. Future Information Technology, Application, and Service, Lecture Notes in Electrical Engineering, J. J. Park, V. C. M. Leung, C.-L. Wang and T. Shon, eds. 53—59, Springer, the Netherlands, 2012.Google ScholarGoogle Scholar
  23. W. Teepe. 2009. On BAN logic and hash functions or: How an unjustified inference rule causes problems. Autonomous Agents and Multi-Agent Systems 19, 1 (2009), 76–88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Wessels and B. V. Finance. 2001. Application of BAN-Logic, 19 April [online] http://htwww.win.tue.nl/ipa/archive/springdays2001/banwessels.pdf (accessed 07 May 2017).Google ScholarGoogle Scholar
  25. W.-B. Hsieh and J.-S. Leu. 2014. Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks. Wireless Communications and Mobile Computing 14, 10 (2014), 995–1006.Google ScholarGoogle ScholarCross RefCross Ref
  26. D. He, Y. Zhang, and J. Chen. 2014. Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications 74, 2 (2014), 229–243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. C.-T. Li, M.-S. Hwang, and Y.-P. Chu. 2008. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications 31, 12 (2008), 2803–2814, 7/30/. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. S. Chaudhry, H. Naqvi, T. Shon, M. Sher, and M. Farash. 2015. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. Journal of Medical Systems 39, 6 (2015), 1–11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Chaudhry, H. Naqvi, M. Sher, M. Farash, and M. Hassan. 2015. An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Networking and Applications 1–15, (2015).Google ScholarGoogle Scholar
  30. N. Koblitz, A. Menezes, and S. Vanstone. 2000. The state of elliptic curve cryptography. In Towards a Quarter-Century of Public Key Cryptography, N. Koblitz, ed., 103–123, Springer, New York, (2000).Google ScholarGoogle Scholar

Index Terms

  1. A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Article Metrics

      • Downloads (Last 12 months)21
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!