A secure ticket-based authentication mechanism for proxy mobile IPv6 networks in volunteer computing

Mojtaba Alizadeh*, Mohammad Hesam Tadayon, Kouichi Sakurai, Hiroaki Anada, Alireza Jolfaei

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Technology advances-such as improving processing power, battery life, and communication functionalities-contribute to making mobile devices an attractive research area. In 2008, in order to manage mobility, the Internet Engineering Task Force (IETF) developed Proxy Mobile IPv6, which is a network-based mobility management protocol to support seamless connectivity of mobile devices. This protocol can play a key role in volunteer computing paradigms as a user can seamlessly access computing resources. The procedure of user authentication is not defined in this standard; thus, many studies have been carried out to propose suitable authentication schemes. However, in the current authentication methods, with reduced latency and packet loss, some security and privacy considerations are neglected. In this study, we propose a secure and anonymous ticket-based authentication (SATA) method to protect mobile nodes against existing security and privacy issues. The proposed method reduces the overhead of handover authentication procedures using the ticket-based concept. We evaluated security and privacy strengths of the proposed method using security theorems and BAN logic.

Original languageEnglish
Article number82
Pages (from-to)1-16
Number of pages16
JournalACM Transactions on Internet Technology
Volume21
Issue number4
Early online date22 Jul 2021
DOIs
Publication statusPublished - Nov 2021

Keywords

  • User authentication
  • volunteer computing
  • proxy mobile IPv6
  • security and privacy
  • network protocol
  • network security

Fingerprint

Dive into the research topics of 'A secure ticket-based authentication mechanism for proxy mobile IPv6 networks in volunteer computing'. Together they form a unique fingerprint.

Cite this