z-logo
open-access-imgOpen Access
Adaptive authentication scheme for mobile devices in proxy MIPv6 networks
Author(s) -
You Ilsun,
Lim Jae Deok,
Kim Jeong Nyeo,
Ahn Hyobeom,
Choi Chang
Publication year - 2016
Publication title -
iet communications
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.355
H-Index - 62
eISSN - 1751-8636
pISSN - 1751-8628
DOI - 10.1049/iet-com.2016.0480
Subject(s) - proxy mobile ipv6 , computer science , computer network , authentication (law) , mutual authentication , proxy (statistics) , computer security , mobility management , scheme (mathematics) , mobile ip , mobile device , mobile computing , world wide web , mathematical analysis , mathematics , machine learning
Mobility management has become a core function in internet services and networks as mobile devices have been widely used and their capabilities have dramatically advanced. It is expected that proxy mobile IPv6 (PMIPv6), which is the most prominent solution, will play an important role in supporting these devices’ mobility. To protect PMIPv6 networks, several authentication schemes have been presented. However, due to their static approach, the existing schemes failed to keep a good balance between security and efficiency. Motivated by this, the authors study an adaptive authentication scheme for mobile devices in PMIPv6 networks. In particular, the proposed scheme considers mobile nodes’ context information to decide authentication strength, based on which adaptive authentication is performed. It is shown from the formal security verification and the example study that the proposed scheme is not only correct, but also achieves a good trade‐off between security and efficiency

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here