detail the necessary steps for the re-authentication of
MR within the same PMIPv6 domain when it
removes between different MAGs and the re-
authentication of MR between different PMIPv6
domains.
REFERENCES
V. Devarapalli, R. Wakikawa, A. Petrescu and P. Thubert,
“Network Mobility (NEMO) Basic Support Protocol”,
IETF, RFC 3963, January 2005.
D. Johnson, C. Perkins, and J. Arkko, “Mobility Support
in IPv6”, IETF, RFC 6275, July 2011.
I. El Bouabidi, S. Ben Ameur, S. Smaoui, F. Zarai and M.
S. Obaidat, L. Kamoun, “Secure macro mobility
protocol for new generation access network”,
International Wireless Communications and Mobile
Computing Conference (IWCMC), Nicosia, pp. 518–
523, 4-8 August 2014.
S. Smaoui, S. Ben Ameur, I. El Bouabidi, F. Zarai and
M.S. Obaidat, “Secure micro mobility protocol for
new generation wireless network”, International
Wireless Communications and Mobile Computing
Conference (IWCMC), Nicosia, pp. 895–900, 4-8
August 2014.
A. H. A. Hashim, W. H. Hassan, S. Islam, R. A. Saeed,
1M.K. Hasan, J I. Daoud and O. O. Khalifa”, An
Enhanced Macro Mobility Management Scheme in
NEMO Environment to Achieve Seamless Handoff”,
World Applied Sciences Journal (Mathematical
Applications in Engineering), Vol. 21, pp. 35-39,
2013.
J. Kempf, “Goals for Network-Based Localized Mobility
Management (NETLMM)”, IETF, RFC 4831, April
2007.
H. Soliman, C. Castelluccia, K. El Malki and L. Bellier
‘Hierarchical Mobile IPv6 Mobility Management
(HMIPv6)”, Network Working Group RFC 5380,
Standards Track, October 2008.
S. Gundavelli, V. Devarapalli, K. Chowdhury, B. Patil and
K. Leung, “Proxy Mobile IPv6”, IETF, RFC 5213,
August 2008.
C. Vogt and J. Kempf, “Security Threats to Network-
Based Localized Mobility Management (NETLMM)”,
IETF, RFC 4832, April 2007.
J. Korhonen, J. Bournelle, K. Chowdhury, A. Muhanna,
U. Meyer, “Diameter Proxy Mobile IPv6: Mobile
Access Gateway and Local Mobility Anchor
Interaction with Diameter Server”, IETF, RFC 5213,
August 2008.
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson and H.
Levkowetz, “Extensible Authentication Protocol
(EAP)”, IETF, RFC 3748, June 2008.
W. Simpson, “PPP Challenge Handshake Authentication
Protocol (CHAP)”, IETF, RFC 1994, August 1996.
D. Simon, B. Aboba and R. Hurst, “The EAP-TLS
Authentication Protocol,’’ IETF, RFC 5216, Mach
2008.
Y.E.H.E. Idrissi, N. Zahid, M. Jedra, “Security Analysis of
3GPP (LTE) – WLAN Interworking and A New Local
Authentication Method based on EAP-AKA”, Future
Generation Communication Technology (FGCT), pp.
137 – 142, 12-14 December 2012.
A. H. Hassanein, A. A. Abdel Hafez, A. E. H. A. Gaafar,
“New Authentication and Key Agreement Protocol for
LTE-WLAN Interworking”, International Journal of
Computer Applications,Vol. 61, No.19, pp. 20-24,
January 2013.
B. Yu, J. Zhang, Z. Wu, “Improved EAP-AKA Protocol
Based on Redirection Defense”, P2P, Parallel, Grid,
Cloud and Internet Computing (3PGCIC), 2014 Ninth
International Conference, pp. 543 – 547, 8-10
November 2014.
H. Mun, K. Han, k. Kim, “3G-WLAN Interworking:
Security Analysis and New Authentication and Key
Agreement based on EAP-AKA”, Wireless
Telecommunications Symposium, pp. 1-8, April 2009.
AVISPA: Automated validation of internet security
protocols and applications (2003) FET Open Project
IST-2001-39252. http://www.avispa-project.org/
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L.
Compagna, J. Cuellar, P. Hankes Drielsma, P.-C
Heam., O. Kouchnarenko, J. Mantovani , S.
Modersheim , D. von Oheimb, M. Rusinowitch, J.
Santos Santiago, M. Turuani, L. Vigano, and L.
Vigneron, “The AVISPA Tool for the automated
validation of internet security protocols and
applications”, In K. Etessami and S. Rajamani, editors,
17th International Conference on Computer Aided
Verification, CAV2005, Lecture Notes in Computer
Science, 3576, 281285, Edinburgh, Scotland, 2005.
HLPSL Tutorial available at http://www.avispa-
project.org/package /tutorial.pdf/ June 30, 2006.
Collections of Security Protocols, available at
http://www.avispa-project.org.
G. Lowe. “A hierarchy of authentication specifications”,
Proceedings of the 10th IEEE Computer Security
Foundations Workshop (CSFW’97), pp. 31–43, 1997.
D. Basin, S. Mödersheim, and L. Vigano, “OFMC: A
Symbolic Model-Checker for Security Protocols”,
International Journal of Information Security, Vol. 4,
No. 3, pp. 181-208, June 2005.
M. Turuani, “The cl-atse protocol analyser”, 17th
international Conference, on Term Rewriting and
Applications (RTA), USA, pp. 277-286 August 2006.
AnEfficientandSecureMutualAuthenticationMechanisminNEMO-basedPMIPv6Networks:AMethodologyand
SimulationAnalysis
21