LR-AKE-based AAA for network mobility (NEMO) over wireless links

被引:16
作者
Fathi, Hanane [1 ]
Shin, SeongHan
Kobara, Kazukuni
Chakraborty, Shyam S.
Imai, Hideki
Prasad, Ramjee
机构
[1] Natl Inst Adv Ind Sci & Technol, Res Ctr Informat Secur, Chiyoda Ku, Tokyo 1010021, Japan
[2] Aalborg Univ, CTIF, DK-9220 Aalborg, Denmark
[3] Ericsson Finland, Corp Res, Jorvas 02420, Finland
[4] Aalto Univ, Dept Elect & Comp Engn, FIN-02150 Espoo, Finland
关键词
authenticated key exchange; authentication anthorization accounting (AAA); handover delay; IP-based mobile networks; leakage resilience; mobile IPv6 (MIPv6); mobile routers; NEMO; session continuity; visiting mobile nodes;
D O I
10.1109/JSAC.2006.875111
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network mobility introduces far more complexity than host mobility. Therefore, host mobility protocols such as Mobile IPv6 (MIPv6) need to be extended to support this new type of mobility. To address the extensions needed for network mobility, the IETF NEMO working group has recently standardized the network mobility basic support protocol in RFC.3963. However, in this RFC, it is not mentioned how authentication authorization and accounting (AAA) issues are handled in NEMO environment. Also, the use of IPsec to secure NEMO procedures does not provide robustness against leakage of stored secrets. To address this security issue and to achieve AAA with mobility, we propose new handover procedures to be performed by mobile routers and by visiting mobile nodes. This new handover procedure is based on leakage resilient-authenticated key establishment (LR-AKE) protocol. Using analytical models, we evaluate the proposed handover procedure in terms of handover delay which affects the session continuity. Our performance evaluation is based on transmission, queueing and encryption delays over wireless links.
引用
收藏
页码:1725 / 1737
页数:13
相关论文
共 21 条
[1]   Securing route optimisation in NEMO [J].
Calderón, M ;
Bernardos, CJ ;
Bagnulo, M ;
Soto, I .
Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2005, :248-254
[2]  
Devarapalli V., 2005, 3963 IETF RFC
[3]   Authenticated access for IPv6 supported mobility [J].
Engelstad, P ;
Haslestad, T ;
Paint, F .
EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, :569-575
[4]  
*ETSI, 2002, 101292 ETSI TS
[5]  
*ETSI, 2005, 122105 ETSI TS
[6]  
Halevi Shai., 1999, ACM T INFORM SYST SE, P230
[7]  
Harkins Dan, 1998, 2409 IETF RFC
[8]  
Johnson D. B., 2004, 3775 IETF RFC
[9]  
JUNG S, 2004, LECT NOTES COMPUTER
[10]  
Kaufman C., 2005, RFC4306 IETF