Proof of certificateless MIP registration protocol based on PCL

Security protocols are the basis of many mobile communication systems, thus it is important to ensure protocol property correct. Using Protocol Composition Logic (PCL), this paper proves a Mobile IP (MIP) registration protocol that is based on certificateless public key signature without pairing between home agent and foreign agent, which minimizes the registration time and cost as well as improves the security compared with the identity-based and certificate-based registration protocol. Analysis and proof shows that the proposed protocol provides users security and authentications, moreover, the anonymity property is proved correct.

[1]  John C. Mitchell,et al.  A derivation system and compositional logic for security protocols , 2005, J. Comput. Secur..

[2]  Joonsang Baek,et al.  Certificateless Public Key Encryption Without Pairing , 2005, ISC.

[3]  Wang Haitao,et al.  The security issues and countermeasures in Mobile IP , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).

[4]  Stephen T. Kent,et al.  A public-key based secure mobile IP , 1997, MobiCom '97.

[5]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[6]  Anupam Datta,et al.  The Impossibility of Realizable Ideal Functionality , 2005 .

[7]  Changxing Pei,et al.  Efficient Mobile IP Registration in Certificateless Public Key Infrastructure Without Pairing , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[8]  Bin Zhao,et al.  Mobile ip registration in certificateless public key infrastructure , 2007, IET Inf. Secur..

[9]  Gavin Lowe,et al.  Some new attacks upon security protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[10]  Stephen T. Kent,et al.  A public‐key based secure Mobile IP , 1999, Wirel. Networks.

[11]  Hyunseung Choo,et al.  ID-Based Secure Session Key Exchange Scheme to Reduce Registration Delay with AAA in Mobile IP Networks , 2005, International Conference on Computational Science.

[12]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[13]  John C. Mitchell,et al.  Protocol Composition Logic , 2011, Formal Models and Techniques for Analyzing Security Protocols.

[14]  Stuart Jacobs Mobile IP Public Key Based Authentication , 2001 .