Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is n...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UTM Press
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/57828/1/SabariahBaharun2015_AnonymityandUntraceabilityAssessmentofAuthenticationProtocols.pdf |
_version_ | 1796860387185917952 |
---|---|
author | Alizadeh, Mojtaba Baharun, Sabariah Zamani, Mazdak Khodadadi, Touraj Darvishi, Mahdi Gholizadeh, Somayyeh Ahmadi, Hossein |
author_facet | Alizadeh, Mojtaba Baharun, Sabariah Zamani, Mazdak Khodadadi, Touraj Darvishi, Mahdi Gholizadeh, Somayyeh Ahmadi, Hossein |
author_sort | Alizadeh, Mojtaba |
collection | ePrints |
description | The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms. |
first_indexed | 2024-03-05T19:40:36Z |
format | Article |
id | utm.eprints-57828 |
institution | Universiti Teknologi Malaysia - ePrints |
language | English |
last_indexed | 2024-03-05T19:40:36Z |
publishDate | 2015 |
publisher | Penerbit UTM Press |
record_format | dspace |
spelling | utm.eprints-578282021-12-06T03:13:41Z http://eprints.utm.my/57828/ Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6 Alizadeh, Mojtaba Baharun, Sabariah Zamani, Mazdak Khodadadi, Touraj Darvishi, Mahdi Gholizadeh, Somayyeh Ahmadi, Hossein T Technology (General) The Proxy Mobile IPv6 or the PMIPv6 is a protocol for mobile management as established by the Internet Engineering Task Force or IETF to assist in the intense usage of mobile devices and to lower the overhead of signaling. As the inclusion of the mobile node in the signaling related to mobility is not necessary, this type of solutions based on networks optimize the performance of the handover based on signaling overhead and handover latency. Nevertheless, the PMIPv6 has several disadvantages such as issues of privacy and security. The process of authentication of users is usually needed at the time of connecting to a wireless network. The mobile users might wander away from their home networks and be approached by other network services. These network services would usually require the users' credentials to authorize the usage of the service. In order to retain a level of anonymity, various degrees of information are required to be safe guarded including the Local Mobility Anchor ID, Media Access Gateway, and Mobile Node. Nevertheless, a few methods of authentication have been suggested to enhance the PMIPv6's performance since 2008 when this protocol was first established [1]; however, the issues of privacy are often ignored. This study attempts to evaluate the authentication methods of the PMIPv6 according to the anonymity of several network mechanisms. The findings of this study reveal that it is important to suggest an appropriate method of enhancing the protection and privacy of network mechanisms. Penerbit UTM Press 2015 Article PeerReviewed application/pdf en http://eprints.utm.my/57828/1/SabariahBaharun2015_AnonymityandUntraceabilityAssessmentofAuthenticationProtocols.pdf Alizadeh, Mojtaba and Baharun, Sabariah and Zamani, Mazdak and Khodadadi, Touraj and Darvishi, Mahdi and Gholizadeh, Somayyeh and Ahmadi, Hossein (2015) Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6. Jurnal Teknologi, 72 (5). pp. 31-34. ISSN 0127-9696 http://dx.doi.org/10.11113/jt.v72.3936 DOI:10.11113/jt.v72.3936 |
spellingShingle | T Technology (General) Alizadeh, Mojtaba Baharun, Sabariah Zamani, Mazdak Khodadadi, Touraj Darvishi, Mahdi Gholizadeh, Somayyeh Ahmadi, Hossein Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6 |
title | Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6 |
title_full | Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6 |
title_fullStr | Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6 |
title_full_unstemmed | Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6 |
title_short | Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6 |
title_sort | anonymity and untraceability assessment of authentication protocols in proxy mobile ipv6 |
topic | T Technology (General) |
url | http://eprints.utm.my/57828/1/SabariahBaharun2015_AnonymityandUntraceabilityAssessmentofAuthenticationProtocols.pdf |
work_keys_str_mv | AT alizadehmojtaba anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6 AT baharunsabariah anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6 AT zamanimazdak anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6 AT khodadaditouraj anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6 AT darvishimahdi anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6 AT gholizadehsomayyeh anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6 AT ahmadihossein anonymityanduntraceabilityassessmentofauthenticationprotocolsinproxymobileipv6 |