Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6

Ilsun You, Kouichi Sakurai, Yoshiaki Hori

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

While gracefully combining FMIPv6 and HMIPv6 together, F-HMIPv6 enables the best performance in terms of handover latency and signaling overhead. Recently, to protect F-HMIPv6, Kang and Park proposed a security scheme. This scheme successfully achieves seamless integration with F-HMIPv6 while providing the session key exchange as well as the mobile node authentication. In this paper, Kang-Park's scheme is formally verified based on BAN-logic, and then its weaknesses and related attacks are discussed.

Original languageEnglish
Title of host publication4th International Conference on Frontier of Computer Science and Technology, FCST 2009
Pages351-355
Number of pages5
DOIs
Publication statusPublished - Dec 1 2009
Event4th International Conference on Frontier of Computer Science and Technology, FCST 2009 - Shanghai, China
Duration: Dec 17 2009Dec 19 2009

Other

Other4th International Conference on Frontier of Computer Science and Technology, FCST 2009
CountryChina
CityShanghai
Period12/17/0912/19/09

Fingerprint

Authentication

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

You, I., Sakurai, K., & Hori, Y. (2009). Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6. In 4th International Conference on Frontier of Computer Science and Technology, FCST 2009 (pp. 351-355). [5392894] https://doi.org/10.1109/FCST.2009.75

Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6. / You, Ilsun; Sakurai, Kouichi; Hori, Yoshiaki.

4th International Conference on Frontier of Computer Science and Technology, FCST 2009. 2009. p. 351-355 5392894.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

You, I, Sakurai, K & Hori, Y 2009, Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6. in 4th International Conference on Frontier of Computer Science and Technology, FCST 2009., 5392894, pp. 351-355, 4th International Conference on Frontier of Computer Science and Technology, FCST 2009, Shanghai, China, 12/17/09. https://doi.org/10.1109/FCST.2009.75
You I, Sakurai K, Hori Y. Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6. In 4th International Conference on Frontier of Computer Science and Technology, FCST 2009. 2009. p. 351-355. 5392894 https://doi.org/10.1109/FCST.2009.75
You, Ilsun ; Sakurai, Kouichi ; Hori, Yoshiaki. / Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6. 4th International Conference on Frontier of Computer Science and Technology, FCST 2009. 2009. pp. 351-355
@inproceedings{7bfbf3495852477e82bf1e6782f5f06f,
title = "Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6",
abstract = "While gracefully combining FMIPv6 and HMIPv6 together, F-HMIPv6 enables the best performance in terms of handover latency and signaling overhead. Recently, to protect F-HMIPv6, Kang and Park proposed a security scheme. This scheme successfully achieves seamless integration with F-HMIPv6 while providing the session key exchange as well as the mobile node authentication. In this paper, Kang-Park's scheme is formally verified based on BAN-logic, and then its weaknesses and related attacks are discussed.",
author = "Ilsun You and Kouichi Sakurai and Yoshiaki Hori",
year = "2009",
month = "12",
day = "1",
doi = "10.1109/FCST.2009.75",
language = "English",
isbn = "9780769539324",
pages = "351--355",
booktitle = "4th International Conference on Frontier of Computer Science and Technology, FCST 2009",

}

TY - GEN

T1 - Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6

AU - You, Ilsun

AU - Sakurai, Kouichi

AU - Hori, Yoshiaki

PY - 2009/12/1

Y1 - 2009/12/1

N2 - While gracefully combining FMIPv6 and HMIPv6 together, F-HMIPv6 enables the best performance in terms of handover latency and signaling overhead. Recently, to protect F-HMIPv6, Kang and Park proposed a security scheme. This scheme successfully achieves seamless integration with F-HMIPv6 while providing the session key exchange as well as the mobile node authentication. In this paper, Kang-Park's scheme is formally verified based on BAN-logic, and then its weaknesses and related attacks are discussed.

AB - While gracefully combining FMIPv6 and HMIPv6 together, F-HMIPv6 enables the best performance in terms of handover latency and signaling overhead. Recently, to protect F-HMIPv6, Kang and Park proposed a security scheme. This scheme successfully achieves seamless integration with F-HMIPv6 while providing the session key exchange as well as the mobile node authentication. In this paper, Kang-Park's scheme is formally verified based on BAN-logic, and then its weaknesses and related attacks are discussed.

UR - http://www.scopus.com/inward/record.url?scp=77949847913&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77949847913&partnerID=8YFLogxK

U2 - 10.1109/FCST.2009.75

DO - 10.1109/FCST.2009.75

M3 - Conference contribution

SN - 9780769539324

SP - 351

EP - 355

BT - 4th International Conference on Frontier of Computer Science and Technology, FCST 2009

ER -