An Efficient and Secure Mutual Authentication Mechanism in NEMO-based PMIPv6 Networks: A Methodology and Simulation Analysis

Sirine Ben Ameur, Salima Smaoui, Faouzi Zarai, Mohammad S. Obaidat, Balqies Sadoun

2015

Abstract

Currently, Network Mobility (NEMO) Basic Support protocol enables the attachment of mobile networks to different points in the Internet. It permits session continuity for all nodes in the mobile network to be reachable as the network moves. While this standard is based on the MobileIPv6 standard, it inherits these disadvantages such as security vulnerabilities. To manage the problems of NEMO, many schemes combine it with a network-based approach such as Proxy Mobile IPv6 (PMIPv6). Despite the fact that this latter expedites the real deployment of IP mobility management; it suffers from lack of security. Therefore, we propose an Efficient and Secure Mutual Authentication Mechanism during initial attachment in NEMO-based Proxy Mobile IPv6 Networks called EMA-NEMO based PMIPv6 in order to provide mutual authentication between a mobile router and diameter server during initial attachment of the mobile router to a PMIPv6 domain. Moreover, we evaluate the performance of our scheme using the Automated Validation of Internet Security Protocols and Applications (AVISPA) software which has proved that authentication goals are achieved.

References

  1. V. Devarapalli, R. Wakikawa, A. Petrescu and P. Thubert, “Network Mobility (NEMO) Basic Support Protocol”, IETF, RFC 3963, January 2005.
  2. D. Johnson, C. Perkins, and J. Arkko, “Mobility Support in IPv6”, IETF, RFC 6275, July 2011.
  3. I. El Bouabidi, S. Ben Ameur, S. Smaoui, F. Zarai and M. S. Obaidat, L. Kamoun, “Secure macro mobility protocol for new generation access network”, International Wireless Communications and Mobile Computing Conference (IWCMC), Nicosia, pp. 518- 523, 4-8 August 2014.
  4. S. Smaoui, S. Ben Ameur, I. El Bouabidi, F. Zarai and M.S. Obaidat, “Secure micro mobility protocol for new generation wireless network”, International Wireless Communications and Mobile Computing Conference (IWCMC), Nicosia, pp. 895-900, 4-8 August 2014.
  5. A. H. A. Hashim, W. H. Hassan, S. Islam, R. A. Saeed, 1M.K. Hasan, J I. Daoud and O. O. Khalifa”, An Enhanced Macro Mobility Management Scheme in NEMO Environment to Achieve Seamless Handoff”, World Applied Sciences Journal (Mathematical Applications in Engineering), Vol. 21, pp. 35-39, 2013.
  6. J. Kempf, “Goals for Network-Based Localized Mobility Management (NETLMM)”, IETF, RFC 4831, April 2007.
  7. H. Soliman, C. Castelluccia, K. El Malki and L. Bellier 'Hierarchical Mobile IPv6 Mobility Management (HMIPv6)”, Network Working Group RFC 5380, Standards Track, October 2008.
  8. S. Gundavelli, V. Devarapalli, K. Chowdhury, B. Patil and K. Leung, “Proxy Mobile IPv6”, IETF, RFC 5213, August 2008.
  9. C. Vogt and J. Kempf, “Security Threats to NetworkBased Localized Mobility Management (NETLMM)”, IETF, RFC 4832, April 2007.
  10. J. Korhonen, J. Bournelle, K. Chowdhury, A. Muhanna, U. Meyer, “Diameter Proxy Mobile IPv6: Mobile Access Gateway and Local Mobility Anchor Interaction with Diameter Server”, IETF, RFC 5213, August 2008.
  11. B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson and H. Levkowetz, “Extensible Authentication Protocol (EAP)”, IETF, RFC 3748, June 2008.
  12. W. Simpson, “PPP Challenge Handshake Authentication Protocol (CHAP)”, IETF, RFC 1994, August 1996.
  13. D. Simon, B. Aboba and R. Hurst, "The EAP-TLS Authentication Protocol," IETF, RFC 5216, Mach 2008.
  14. Y.E.H.E. Idrissi, N. Zahid, M. Jedra, “Security Analysis of 3GPP (LTE) - WLAN Interworking and A New Local Authentication Method based on EAP-AKA”, Future Generation Communication Technology (FGCT), pp. 137 - 142, 12-14 December 2012.
  15. A. H. Hassanein, A. A. Abdel Hafez, A. E. H. A. Gaafar, “New Authentication and Key Agreement Protocol for LTE-WLAN Interworking”, International Journal of Computer Applications,Vol. 61, No.19, pp. 20-24, January 2013.
  16. B. Yu, J. Zhang, Z. Wu, “Improved EAP-AKA Protocol Based on Redirection Defense”, P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2014 Ninth International Conference, pp. 543 - 547, 8-10 November 2014.
  17. H. Mun, K. Han, k. Kim, “3G-WLAN Interworking: Security Analysis and New Authentication and Key Agreement based on EAP-AKA”, Wireless Telecommunications Symposium, pp. 1-8, April 2009.
  18. HLPSL Tutorial available at http://www.avispaproject.org/package /tutorial.pdf/ June 30, 2006.
  19. G. Lowe. “A hierarchy of authentication specifications”, Proceedings of the 10th IEEE Computer Security Foundations Workshop (CSFW'97), pp. 31-43, 1997.
  20. D. Basin, S. Mödersheim, and L. Vigano, “OFMC: A Symbolic Model-Checker for Security Protocols”, International Journal of Information Security, Vol. 4, No. 3, pp. 181-208, June 2005.
  21. M. Turuani, “The cl-atse protocol analyser”, 17th international Conference, on Term Rewriting and Applications (RTA), USA, pp. 277-286 August 2006.
Download


Paper Citation


in Harvard Style

Ben Ameur S., Smaoui S., Zarai F., S. Obaidat M. and Sadoun B. (2015). An Efficient and Secure Mutual Authentication Mechanism in NEMO-based PMIPv6 Networks: A Methodology and Simulation Analysis . In Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications - Volume 1: SIMULTECH, ISBN 978-989-758-120-5, pages 13-21. DOI: 10.5220/0005580200130021


in Bibtex Style

@conference{simultech15,
author={Sirine Ben Ameur and Salima Smaoui and Faouzi Zarai and Mohammad S. Obaidat and Balqies Sadoun},
title={An Efficient and Secure Mutual Authentication Mechanism in NEMO-based PMIPv6 Networks: A Methodology and Simulation Analysis},
booktitle={Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications - Volume 1: SIMULTECH,},
year={2015},
pages={13-21},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005580200130021},
isbn={978-989-758-120-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications - Volume 1: SIMULTECH,
TI - An Efficient and Secure Mutual Authentication Mechanism in NEMO-based PMIPv6 Networks: A Methodology and Simulation Analysis
SN - 978-989-758-120-5
AU - Ben Ameur S.
AU - Smaoui S.
AU - Zarai F.
AU - S. Obaidat M.
AU - Sadoun B.
PY - 2015
SP - 13
EP - 21
DO - 10.5220/0005580200130021