Abstract
The long-deferred authentication brings about the latency of mobility service and is critical for the sessions requiring the real time processing. This paper proposes the scheme for providing the authentication service in a local domain with maintaining the design rationale of HMIPv6. Accepting the design logic of HMIPv6, the proposed scheme is able to reduce the overall service latency by reducing the authentication time. To materialize the idea, we analyze the authentication cost by considering the factors of the number of mobile node and its traffic properties.
This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Soliman, H., Castelluccia, C.: Hierarchical Mobile IPv6 mobility management(HMIPv6). IETF Internet Draft, Mobile IP Working Group (June 2003)
Mankin, A., Patil, B., Harkins, D., Nordmark, E., Nikander, P., Roberts, P., Narten, T.: Threat Model introduced by Mobile IPv6. Internet Draft IETF (May 2001)
Dupont, F., Bournelle, J.: AAA for Mobile IPv6. Internet Draft, IETF (November 2001)
Kim, M., Mun, Y., Nah, J., Sohn, S.: Localized Key Management for AAA in Mobile IPv6. IETF Internet Draft, Mobile IP Working Group (October 2002)
Calhoun, P.R., Guttman, E., Arkko, J.: Diameter Base Protocol. Internet Draft, IETF (July 2002)
Le, F., Patile, B., Perkins, C.E.: Diameter Mobile IPv6 Application. Internet Draft, IETF (November 2001)
Kleinrock, L.: Queueing Systems. Theory, vol. 1. John Wiley & Sons, Chichester (1975)
Chiang, K., Shenoy, N.: A Random Walk Mobility Model for Location Management in Wireless Network. In: proc. IEEE PIMRC Conf. (September 2001)
Pack, S., Choi, Y.: Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks. In: proc. IEEE PIMRC Conf. Beijing (September 2003)
Maple, W.: Computing the Steady-State Vector of Markov Chain (2001), www.mapleapps.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, M., Kim, M., Mun, Y. (2005). An Effective Authentication Scheme for Mobile Node with Fast Roaming Property. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424758_58
Download citation
DOI: https://doi.org/10.1007/11424758_58
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25860-5
Online ISBN: 978-3-540-32043-2
eBook Packages: Computer ScienceComputer Science (R0)