Securing NEMO Using a Bilinear Pairing-Based 3-Party Key Exchange (3PKE-NEMO) in Heterogeneous Networks

NEMO means Network Mobility which is the extension of Mipv6 and it is invented for accessing internet for the group of people when they are travelling in Vehicle as Network group. During handoff while exchanging Binding Updates (BU) between the Mobile Network Node (MNN), Correspondent Node (CN) and Home Agent (HA), many security threats are present during those messages exchange. It may prone to several standard malicious attacks on the BU and Binding Acknowledgement. An efficient end-to-end security method is required to protect the BU Exchange between MNN, HA and CN. In this paper, a secure architecture is proposed to provide authentication and confidentiality at each level of communication using a 3 - Party Key Exchange called 3 - PKE - NEMO with the help of Bilinear Pairing Theorem. Handoff delay is reduced without compromising security strength. The whole experimentation of this proposed work is carried out using NS2 simulation tool and authentication proof is given using BAN logic between all the nodes in NEMO. The proposed security architecture is compared with related existing solutions and found to be more secure.

[1]  James Harris Defending the network several times over , 2011, Netw. Secur..

[2]  Yanghee Choi,et al.  Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments , 2008 .

[3]  Shadi Aljawarneh,et al.  Cloud security engineering: Early stages of SDLC , 2017, Future Gener. Comput. Syst..

[4]  Asif Imran,et al.  Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud , 2016, J. Univers. Comput. Sci..

[5]  Kuinam J. Kim,et al.  Secure Route Optimization Scheme for Network Mobility Support in Heterogeneous Mobile Networks , 2017, Wirel. Pers. Commun..

[6]  B. R. Chandavarkar,et al.  Survey Paper: Mobility Management in Heterogeneous Wireless Networks , 2012 .

[7]  Keecheon Kim,et al.  An enhanced mechanism with cryptographic computation cost reduction in AAA-mobile IP architecture , 2013, ICUIMC '13.

[8]  Man Young Rhee Network Layer Security , 2013 .

[9]  Shadi Aljawarneh,et al.  A web engineering security methodology for e-learning systems , 2011, Netw. Secur..

[10]  Sumita Mishra,et al.  A survey of identity and handoff management approaches for the future Internet , 2012, Comput. Commun..

[11]  Shadi Aljawarneh,et al.  A Conceptual Security Framework for Cloud Computing Issues , 2016, Int. J. Intell. Inf. Technol..

[12]  Shadi Aljawarneh,et al.  A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.

[13]  Mohammed Atiquzzaman,et al.  Route optimization in network mobility: Solutions, classification, comparison, and future research directions , 2010, IEEE Communications Surveys & Tutorials.

[14]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[15]  Shadi Aljawarneh,et al.  A multithreaded programming approach for multimedia big data: encryption system , 2017, Multimedia Tools and Applications.

[16]  Shadi R. Masadeh,et al.  A Secure Data Transmission Mechanism for Cloud Outsourced Data , 2013, Int. J. Cloud Appl. Comput..

[17]  Marcelo Bagnulo,et al.  Securing route optimisation in NEMO , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[18]  Ashraf Odeh,et al.  Secure Communication: A Proposed Public Key Watermark System , 2013, Int. J. Inf. Secur. Priv..

[19]  Bo Hu,et al.  Mobility Management at Network Layer , 2016 .

[20]  Victor Fajardo,et al.  IEEE 802.21: Media independent handover: Features, applicability, and realization , 2009, IEEE Communications Magazine.

[21]  Lo-Yao Yeh,et al.  A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs , 2013, J. Netw. Comput. Appl..

[22]  Christopher Edwards,et al.  A Collaborative AAA Architecture to Enable Secure Real-World Network Mobility , 2011, Networking.

[23]  Yuan'an Liu,et al.  A local secure handover authentication scheme based on AAA for NEMO in aeronautical passanger communication environment , 2015, 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).

[24]  Jung-Doo Koo,et al.  Authenticated route optimization scheme for network mobility (NEMO) support in heterogeneous networks , 2010 .

[25]  Shadi Aljawarneh,et al.  Investigations of automatic methods for detecting the polymorphic worms signatures , 2016, Future Gener. Comput. Syst..

[26]  Burkhard Stiller,et al.  AAA: a survey and a policy-based architecture and framework , 2002 .

[27]  C. E. Perkins Mobile IP , 1997 .

[28]  Christian Huitema,et al.  End-system-based mobility support in IPv6 , 2005, IEEE Journal on Selected Areas in Communications.

[29]  Jeng-Farn Lee,et al.  A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks , 2011, Comput. Networks.

[30]  Marcelo Bagnulo,et al.  CRYPTRON: CRYptographic Prefixes for Route Optimization in NEMO , 2010, 2010 IEEE International Conference on Communications.

[31]  Mihui Kim,et al.  A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment , 2005, ICCSA.

[32]  Kumkum Garg,et al.  A review on host vs. Network Mobility (NEMO) handoff techniques in heterogeneous network , 2014, Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization.

[33]  Debashis De,et al.  Location management in mobile network: A survey , 2016, Comput. Sci. Rev..

[34]  Ruoshan Kong The Simulation for Network Mobility Based on NS2 , 2008, 2008 International Conference on Computer Science and Software Engineering.

[35]  Wonjun Lee,et al.  Optimal Binding-Management-Key Refresh Interval in Mobile IPv6 Networks , 2009, IEEE Transactions on Vehicular Technology.

[36]  Christian Bauer A Secure Correspondent Router Protocol for NEMO Route Optimization , 2013, Comput. Networks.

[37]  Eranga Perera,et al.  Survey on network mobility support , 2004, MOCO.

[38]  DeDebashis,et al.  Location management in mobile network , 2016 .

[39]  Chin-Ling Chen,et al.  A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks , 2015, J. Sensors.

[40]  Tatsuaki Okamoto,et al.  Cryptography Based on Bilinear Maps , 2006, AAECC.

[41]  SeongHan Shin,et al.  LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links , 2006, IEEE Journal on Selected Areas in Communications.

[42]  Tai-Myung Chung,et al.  Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure , 2011, IEEE Transactions on Vehicular Technology.

[43]  Sungchang Lee,et al.  Route Optimization with AAA in Network Mobility , 2006, ICCSA.

[44]  Pierre Reinbold,et al.  IP micro-mobility protocols , 2003, IEEE Communications Surveys & Tutorials.

[45]  Xuemin Shen,et al.  Multiple Key Sharing and Distribution Scheme With$(n,t)$Threshold for NEMO Group Communications , 2006, IEEE Journal on Selected Areas in Communications.