A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing

2021 ◽  
Vol 21 (4) ◽  
pp. 1-16
Author(s):  
Mojtaba Alizadeh ◽  
Mohammad Hesam Tadayon ◽  
Kouichi Sakurai ◽  
Hiroaki Anada ◽  
Alireza Jolfaei

Technology advances—such as improving processing power, battery life, and communication functionalities—contribute to making mobile devices an attractive research area. In 2008, in order to manage mobility, the Internet Engineering Task Force (IETF) developed Proxy Mobile IPv6, which is a network-based mobility management protocol to support seamless connectivity of mobile devices. This protocol can play a key role in volunteer computing paradigms as a user can seamlessly access computing resources. The procedure of user authentication is not defined in this standard; thus, many studies have been carried out to propose suitable authentication schemes. However, in the current authentication methods, with reduced latency and packet loss, some security and privacy considerations are neglected. In this study, we propose a secure and anonymous ticket-based authentication (SATA) method to protect mobile nodes against existing security and privacy issues. The proposed method reduces the overhead of handover authentication procedures using the ticket-based concept. We evaluated security and privacy strengths of the proposed method using security theorems and BAN logic.

2015 ◽  
Vol 72 (5) ◽  
Author(s):  
Mojtaba Alizadeh ◽  
Mazdak Zamani ◽  
Sabariah Baharun ◽  
Wan Haslina Hassan ◽  
Touraj Khodadadi

Mobility management protocols support mobility for roaming mobile nodes in order to provide seamless connectivity. Proxy Mobile IPv6 is a network-based localized mobility management protocol that is more suitable for resource constrained devices among different mobility management schemes. In this protocol, all mobility signaling procedures are completed by network entity not mobile node. According to the Proxy Mobile IPv6 architecture, an authentication procedure has a key role to protect the network against different security threats; however, the details of authentication procedure is not specified in this standard. In this paper, different security features are explored to evaluate the authentication protocols in Proxy Mobile IPv6. The existing authentication approaches can be analyzed based on these criteria to find security issues.


PLoS ONE ◽  
2015 ◽  
Vol 10 (11) ◽  
pp. e0142716 ◽  
Author(s):  
Mojtaba Alizadeh ◽  
Mazdak Zamani ◽  
Sabariah Baharun ◽  
Azizah Abdul Manaf ◽  
Kouichi Sakurai ◽  
...  

2016 ◽  
Vol 8 (1) ◽  
pp. 104 ◽  
Author(s):  
Javier Carmona-Murillo ◽  
David Cortés-Polo ◽  
Jesús Calle-Cancho ◽  
José-Luis González-Sánchez ◽  
Francisco-Javier Rodríguez-Pérez

Mobile data traffic in the Internet has experienced an exponential growth due to the widespread presence of multimedia capable mobile devices and the deployment of multiple wireless networks. With this continuous development of mobile communications, the achievement of an efficient IP mobility management protocol has revealed as one of the major challenges in next-generation wireless networks. Mobility management solutions are responsible for maintaining the ongoing communications while the user roams among distinct networks. Mobile IPv6 and Proxy Mobile IPv6 are the most representative solutions standardized by the IETF. Recently, the IPv6 mobility support has been newly integrated into the kernel sources and Linux mobility ready kernels are available from versions 3.8.1. In this article, we conduct an analytic and experimental evaluation of Mobile IPv6 and Proxy Mobile IPv6. We develop an analytic model of the signaling and handover latency. Moreover, we present an experimental study these protocols based on their open source implementations. We provide numerical results based on experiments made in real scenarios under different network conditions.


PLoS ONE ◽  
2015 ◽  
Vol 10 (12) ◽  
pp. e0145975
Author(s):  
Mojtaba Alizadeh ◽  
Mazdak Zamani ◽  
Sabariah Baharun ◽  
Azizah Abdul Manaf ◽  
Kouichi Sakurai ◽  
...  

2018 ◽  
Vol 19 (4) ◽  
pp. 309-337 ◽  
Author(s):  
Rama Subbareddy Somula ◽  
Sasikala R

In recent years, the mobile devices become popular for communication and running advanced real time applications such as face reorganization and online games. Although, mobile devices advanced for providing significant benefits for mobile users. But still, these devices suffers with limited recourses such as computation power, battery and storage space due to the portable size. However, The Cloud Technology overcome the limitations of mobile computing with better performance and recourses. The cloud technology provides enough computing recourses to run mobile applications as storage computing power on cloud platform. Therefore, the novel technology called mobile cloud computing (MCC) is introduced by integrating two technologies (Mobile Computing, Cloud Computing) in order to overcome the limitations(such as Battery life, Storage capacity, Processing capacity) of Mobile Devices by offloading application to recourse rich Remote server. This paper presents an overview of MCC, the advantages of MCC, the related concepts and the technology beyond various offloading frameworks, the architecture of the MCC, Cloudlet technology, security and privacy issues and limitations of mobile cloud computing. Finally, we conclude with feature research directions in MCC.


2014 ◽  
Vol 10 (3) ◽  
pp. 287-305 ◽  
Author(s):  
Illkyun Im ◽  
Jongpil Jeong

With recent advancements in wireless communication technologies, mobile multicasting is becoming important, in an effort to use network resources more efficiently. In the past, when various mobile IP-based multicast techniques were proposed, the focus was on the costs needed for network delivery to provide multicast services, as well as on minimizing the multicast handover delay. However, it is fundamentally difficult to resolve the problems of handover delay and tunnel convergence for techniques using MIPv6 (Mobile IPv6), a host-based mobility management protocol. To resolve these problems, the network-based mobility management protocol PMIPv6 (Proxy Mobile IPv6) was standardized. Although performance is improved in PMIPv6 over MIPv6, it still suffers from problems of handover delay and tunnel convergence. To overcome these limitations, a technique called LFH (Low-cost and Fast Handoff) is proposed in this paper, for fast and low-cost mobility management with multicasting support in PMIPv6 networks. To reduce the interactions between the complex multicast routing protocol and multicast messages, a simplified proxy method called MLD (Multicast Listener Discovery) is implemented and modified. Furthermore, a TCR (Tunnel Combination and Reconstruction) algorithm was used in the multicast handover procedure within the LMA (Local Mobility Anchor) domain, as well as in the multicast handover procedure between domains, in order to overcome the problem of tunnel convergence. It was found that, compared to other types of multicast techniques, LFH reduces multicast delay, and requires lower cost.


Sign in / Sign up

Export Citation Format

Share Document