Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6

The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is n...

Full description

Bibliographic Details
Main Authors: Alizadeh, Mojtaba, Baharun, Sabariah, Zamani, Mazdak, Khodadadi, Touraj, Darvishi, Mahdi, Gholizadeh, Somayyeh, Ahmadi, Hossein
Format: Article
Language:English
Published: Penerbit UTM Press 2015
Subjects:
Online Access:http://eprints.utm.my/57828/1/SabariahBaharun2015_AnonymityandUntraceabilityAssessmentofAuthenticationProtocols.pdf
_version_ 1796860387185917952
author Alizadeh, Mojtaba
Baharun, Sabariah
Zamani, Mazdak
Khodadadi, Touraj
Darvishi, Mahdi
Gholizadeh, Somayyeh
Ahmadi, Hossein
author_facet Alizadeh, Mojtaba
Baharun, Sabariah
Zamani, Mazdak
Khodadadi, Touraj
Darvishi, Mahdi
Gholizadeh, Somayyeh
Ahmadi, Hossein
author_sort Alizadeh, Mojtaba
collection ePrints
description The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms.
first_indexed 2024-03-05T19:40:36Z
format Article
id utm.eprints-57828
institution Universiti Teknologi Malaysia - ePrints
language English
last_indexed 2024-03-05T19:40:36Z
publishDate 2015
publisher Penerbit UTM Press
record_format dspace
spelling utm.eprints-578282021-12-06T03:13:41Z http://eprints.utm.my/57828/ Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6 Alizadeh, Mojtaba Baharun, Sabariah Zamani, Mazdak Khodadadi, Touraj Darvishi, Mahdi Gholizadeh, Somayyeh Ahmadi, Hossein T Technology (General) The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms. Penerbit UTM Press 2015 Article PeerReviewed application/pdf en http://eprints.utm.my/57828/1/SabariahBaharun2015_AnonymityandUntraceabilityAssessmentofAuthenticationProtocols.pdf Alizadeh, Mojtaba and Baharun, Sabariah and Zamani, Mazdak and Khodadadi, Touraj and Darvishi, Mahdi and Gholizadeh, Somayyeh and Ahmadi, Hossein (2015) Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6. Jurnal Teknologi, 72 (5). pp. 31-34. ISSN 0127-9696 http://dx.doi.org/10.11113/jt.v72.3936 DOI:10.11113/jt.v72.3936
spellingShingle T Technology (General)
Alizadeh, Mojtaba
Baharun, Sabariah
Zamani, Mazdak
Khodadadi, Touraj
Darvishi, Mahdi
Gholizadeh, Somayyeh
Ahmadi, Hossein
Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
title Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
title_full Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
title_fullStr Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
title_full_unstemmed Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
title_short Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
title_sort anonymity and untraceability assessment of authentication protocols in proxy mobile ipv6
topic T Technology (General)
url http://eprints.utm.my/57828/1/SabariahBaharun2015_AnonymityandUntraceabilityAssessmentofAuthenticationProtocols.pdf
work_keys_str_mv AT alizadehmojtaba anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6
AT baharunsabariah anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6
AT zamanimazdak anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6
AT khodadaditouraj anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6
AT darvishimahdi anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6
AT gholizadehsomayyeh anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6
AT ahmadihossein anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6