By Topic

Secure Mobility Management Scheme for 6LoWPAN ID/Locator Split Architecture

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Jara, A.J. ; Univ. of Murcia, Murcia, Spain ; Marin, L. ; Skarmeta, A.F.G. ; Singh, D.
more authors

Mobility support in 6LoWPAN increases the fault tolerance capacity, connectivity, allows extending and adapting network to changes of location and infrastructure. These features are necessary to satisfy the dependability and scalability of the networks of the future world. Several solutions have been developed to support mobility, but they present limitations mainly caused by the role of IP address as both node ID for session determination in the application/transport layer, and Locator in the network layer. For that reason, our proposal is based on one of the first ID/Locator split architectures with 6LoWPAN support, which has defined compressed and size optimized mobility signalling. The mentioned approach presents several security challenges, since ID/Locator management messages are potentially dangerous, for example a malicious host might be able to establish false updates of the location, thereby preventing some packets from reaching their intended destination, diverting some traffic to the intruder, or flooding third parties with unwanted traffic. For that reason, in this paper is carried out a security analysis and proposed a novel secure mobility management scheme considering the requirements and constrains from the Future Internet of Things networks. The proposed scheme is based on an extension of the Return Rout ability process with ECC-based asymmetric cryptography, in order to carry out scalable inter-domain authentication for all the parties involved in the location update, home registration and binding transfer processes.

Published in:

Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2011 Fifth International Conference on

Date of Conference:

June 30 2011-July 2 2011