Comments and improvements of “HOTA: Handover optimized ticket­based authentication in network­based mobility management”

Nowadays, various mobile devices are being an inseparable part of our normal life. Mobile users tend to be connected to the Internet seamlessly, which is provided by mobility management protocols. One of the latest mobility management protocol is Proxy Mobile IPv6 (PMIPv6), which is a networkbased...

Full description

Bibliographic Details
Main Authors: Alizadeh, Mojtaba, Tadayon, Mohammad Hesam, Sakurai, Kouichi, Baharun, Sabariah, Anada, Hiroaki, Zamani, Mazdak, Akram, M. Zeki, Chaudhry, Shehzad Ashraf, Khan, Muhammad Khurram
Format: Conference or Workshop Item
Language:English
English
English
Published: IEEE 2017
Subjects:
Online Access:http://irep.iium.edu.my/53834/
http://irep.iium.edu.my/53834/
http://irep.iium.edu.my/53834/
http://irep.iium.edu.my/53834/3/53834-Comments%20and%20improvements%20of%20HOTA_Handover.pdf
http://irep.iium.edu.my/53834/2/53834-Comments%20and%20improvements%20of%20HOTA_SCOPUS.pdf
http://irep.iium.edu.my/53834/14/53834%20Comments%20and%20improvements%20%20WOS.pdf
Description
Summary:Nowadays, various mobile devices are being an inseparable part of our normal life. Mobile users tend to be connected to the Internet seamlessly, which is provided by mobility management protocols. One of the latest mobility management protocol is Proxy Mobile IPv6 (PMIPv6), which is a networkbased protocol. Authentication mechanism as a critical security procedure is not specified in PMIPv6, hence various authentication methods have been proposed. Lee and Bonin proposed a ticket­based authentication scheme for PMIPv6, which is called HOTA in 2013. Even though, HOTA offers some security protection mechanisms, but is vulnerable to DoS attack. Furthermore, we show other existing drawbacks to the scheme such as vulnerability against de­synchronization attack and Session Hijacking attack. In this paper, we propose an enhancement method to mitigate these security drawbacks. Finally, security and performance of the proposed method are analyzed and compared to HOTA method