
 
channel two SAs are necessary (an incoming and an 
outgoing one). 
The IKEv2 exchange is designed to establish and 
manage SA in four messages. In the two first one, 
called IKE_SA_INIT, the communicating entities 
negotiate cryptographic algorithms, exchange nonce 
and make Diffie-Hellman exchange to obtain a 
shared key. In the last two messages, called 
IKE_AUTH, both entities authenticate the previous 
messages and exchanges Identity. Finally, the SA 
established by IKEv2 is essentially on based 
location.  
In the same context, the Host Identity Protocol is 
used to establish a pair of IPSec security 
associations between two hosts through the HIP 
Base Exchange (HBE). The HBE consists also of 
four messages (I1,R1,I2,R2) based on a classic 
Diffie-Hellman key exchange with an inclusion of a 
puzzle by the responder node as a cryptographic 
challenge in order to avoid a Dos attack from an 
illegitimate node that wishes to saturate the 
responder node with HIP initiation messages (Arraez 
et al., 2011). Finally, the SA established by HIP is 
based essentially on the host identity name space 
introduced by this protocol. 
Developing new security protocols is a difficult 
task and sometimes too difficult task for human 
mind. So, the idea is benefiting from existing 
protocols to create new one. We focus to extend the 
IKEv2 in order to enhance authentication, eliminate 
man-in-the-middle and reply attacks and guarantee 
Dos attacks in order to provide better security 
between the two peers. Hence in this paper, we 
describe a proposal that consists of combining the 
IKEv2 with HIP to set up a security association 
based on two parameters which are location and 
Identity. This combination may provide better 
security properties than each protocol used alone. 
This proposal, named (HIP_IKEv2) couple location 
and identity to define a security association between 
two peers. We have used the Automated Validation 
of Internet Security Protocols and Applications 
(AVISPA) and its Security Protocol Animator 
(SPAN), two powerful automated tools to formally 
specify and validate the HIP_IKEv2 protocol. The 
rest of this paper is structured as follows. Section II 
summarizes the state of the art related to this work. 
Section III describes integrating HIP with IKEv2. In 
Section VI, a formal specification and validation of 
the HIP_IKEv2 with AVISPA and SPAN are 
discussed. Finally, Section VII contains the 
conclusions and future works. 
2 RELATED WORK 
This section details related work focused on IKEv2 
and its improvement. Having several advantages, 
IKEv2 still suffers from some deficiency, such as 
man-in-the-middle and Dos attack. Hence, the issue 
to protect peers form Dos attack has received the 
attention of researchers.  
According to (Iso-Anttila et al., 2007) the 
resistance to Dos attacks is actually weaker in 
IKEv2 than in Just Fast Keying (JFK) or Full-
SIGMA protocol in different networks. Therefore, 
the authors present a proposal to improve IKEv2 
negotiation (Iso-Anttila et al., 2007), based on using 
cookies negotiation in order to detect a Dos attack, 
and present an improved cookies negotiation to 
remedy the weakness present in IKEv2. So the 
authors focus on preventing the traditional 
vulnerable cookies negotiation and adding a new 
challenge to the initiator without adding 
computational load. The proposed cookie 
negotiation delays the responder's calculation work 
to the last second and computational load is kept as 
low as possible. 
Reference (Xiaowei et al., 2010) proposes an 
improvement of IKEv2, which is based on the 
shared secret and asymmetric distribution of 
calculations. By analyzing the improved IKEv2 with 
a cost-based framework, Iso-Anttila concludes that 
the improvement is robust against Dos attack. 
Furthermore, associated with cookie mechanism, the 
improvement can prevent flooding attack from 
spoofed IP addresses. And the improvement can also 
achieve the identity authentication in advance, resist 
man-in-the-middle attack and replay attack. 
In (Zhou et al., 2010), a modified IKEv2 based 
on IP fragmentation, in which the authors design and 
implement an IKE application fragmentation 
protocol and put forward a series of other measures 
related to prevent lKEv2 from Dos attacks. Hence, 
they design a new IKEv2 header format called M-
ISAKMP, and add a new type of Notification 
Payload and other related strategies. With the novel 
application-based fragmentation mechanism, the 
proposed solution achieves defending against Dos 
attack successfully and efficiently. 
3 INTEGRATION HIP WITH 
IKEv2 
This section describes a proposal that is based on 
making modification to the IKEv2 initial exchange 
HIP_IKEv2:AProposaltoImproveInternetKeyExchangeProtocol-basedonHostIdentityProtocol
405