Securing NEMO Using a Bilinear Pairing-Based 3-Party Key Exchange (3PKE-NEMO) in Heterogeneous Networks
- PDF / 1,528,059 Bytes
- 22 Pages / 439.37 x 666.142 pts Page_size
- 91 Downloads / 203 Views
Securing NEMO Using a Bilinear Pairing‑Based 3‑Party Key Exchange (3PKE‑NEMO) in Heterogeneous Networks Vikram Raju Reddicherla1,2 · Umashankar Rawat1 · Kumkum Garg3
© Springer Nature B.V. 2019
Abstract NEMO means Network Mobility which is the extension of Mipv6 and it is invented for accessing internet for the group of people when they are travelling in Vehicle as Network group. During handoff while exchanging Binding Updates (BU) between the Mobile Network Node (MNN), Correspondent Node (CN) and Home Agent (HA), many security threats are present during those messages exchange. It may prone to several standard malicious attacks on the BU and Binding Acknowledgement. An efficient end-to-end security method is required to protect the BU Exchange between MNN, HA and CN. In this paper, a secure architecture is proposed to provide authentication and confidentiality at each level of communication using a 3-Party Key Exchange called 3-PKE-NEMO with the help of Bilinear Pairing Theorem. Handoff delay is reduced without compromising security strength. The whole experimentation of this proposed work is carried out using NS2 simulation tool and authentication proof is given using BAN logic between all the nodes in NEMO. The proposed security architecture is compared with related existing solutions and found to be more secure. Keywords Network Mobility (NEMO) · BAN logic · Binding Update (BU) · Correspondent Node (CN) · Home Agent (HA) · Route Optimization (RO)
1 Introduction Mobile hosts are portable devices, such as laptop computers, digital cellular phones, personal digital assistants, tablets, e-readers, smart phones and many more. The internet usage has increased exponentially in recent years, especially because of these portable devices. * Vikram Raju Reddicherla [email protected]; [email protected] Umashankar Rawat [email protected] Kumkum Garg kumkum.garg@ruj‑bsdu.in 1
Department of Computer Science and Engineering, School of Computing & Information Technology, Manipal University Jaipur, Jaipur, India
2
Information Technology Dept, Shinas College of Technology, Al‑Aqur, Shinas, Sultanate of Oman
3
Bhartiya Skill Development University, Jaipur, India
13
Vol.:(0123456789)
V. R. Reddicherla et al.
During mobility there will be number of different technologies that coexist, and these portable devices should be able to connect to internet irrespective of technology. These portable devices should have compatible interfaces with respective infrastructure and common infrastructure is required in the heterogeneous environment. An efficient mobility management (Mukherjee and De 2016) is required to give better services to end users by determining location within network range. This mobility management occurs in two layers, it can be link layer or network layer. Location Management (Chandavarkar and Ram Mohan Reddy 2012) takes care about maintaining the point of attachment irrespective of their location on move. Along with mobility management and location management, a sea
Data Loading...