Key Exchange Protocol Supporting Mobility and Multihoming

Mohammed A. Tawfiq*, Sufyan T. Faraj Al-Janabi**, Abdul-Karim A. R. Kadhim***
*,**,*** College of Nahrain University ,Baghdad ,Iraq
Periodicity:October - December'2006
DOI : https://doi.org/10.26634/jse.1.2.824

Abstract

In this work, a new key exchange protocol for IP-based mobile networks is introduced. This protocol is called KEPSOM (Key Exchange Protocol Supporting Mobility and Multihoming). The goals of designing KEPSOM are to develop key exchange protocol proposal characterized by its secrecy, simplicity, efficiency, resistivity, and its ability to support mobility and multihoming. The protocol requires only two roundtrips. The design limits the private information revealed by the initiator. An old security association (SA) can be replaced with a new one by rekeying without the need of restarting the protocol with a new session. On the other hand, the changes in IP address due to mobility or multihoming need not to restart the protocol with a new SA session. The proposed protocol can also support key exchange in hybrid wireless network, in which the mobile node can operate in both Ad Hoc and Base Station-oriented wireless network environments using different transmission modes. KEPSOM has been analyzed and proven secure. Several tests have been done to measure and evaluate the performance of the protocol. In these tests, it is found that the required time for rekeying is about 27% of the total required time for exchanging the keys. And the required time to detect and update the change in IP address, which may occur due to mobility or multihoming, is less than 10% of the total required time to establish a new SA session.

Keywords

How to Cite this Article?

Mohammed A. Tawfiq, Sufyan T. Faraj Al-Janabi and Abdul-Karim A. R. Kadhim (2006). Key Exchange Protocol Supporting Mobility and Multihoming. i-manager’s Journal on Software Engineering, 1(2), 52-70. https://doi.org/10.26634/jse.1.2.824

References

.
[1] C. Koufmon, "Internet Key Exchonge (IKEv2) Protocol" , Internet draft, droft-ietf-ipsec-ikev2- I 2.txt, IETF, Work in Progress, Jon. 2004.
[2] W AieIIo, S. M. 8ellovin, M. 8loze, R. Conettf. J. loonnidis, A. D. Keromytis, ond O. Reingold "Efficient, DoS-Resistont, Secure Key Exchonge for Internet Protocols" , CCS'02. Nov, I 8-22, 2002, Woshington, DC USA Copyright 2002 ACM.
[3] R. Conetti ond H. Krowczyk, "Anolysis of key-exchonge protocols ond their use for building secure chonnels", Proc, of the Eurocrypt conference, May 2001
[4] R Hoffmon, "Feotures of proposed processors to IKE" , Internet droft (work in progress), (droft-ietf-ipsec-soi- feotures-01 .txt), May 2002~
[5] R Eronen, "Mobility Protocol Options for lKEv2 (MOPO- IKE)" , Internet droft, Network Working Group, droft-eronen- mobike-mopo-01 .txt, Work in Progress, Oct, 2004,
[6] T. Kivinen, ond H. Tschofenig, "Design of MOBIKE protocol", Internet droft (work in progress), (droff-ietf- mobike-design-01 .txf), Dec. 2004.
[7] T. Kivinen, "MOBIKE Protocol", Internet droft, IKEv2 Mobility ond Multihoming(MOBIKE), droft-kivinen-mobike- protocol-00.txt, Work in Progress, Feb. 2004.
[8] T. Kivinen, "Design of The MOBIKE Protocol", Internet droft, lKEv2 Mobility ond Multihoming (MOBIKE), droft-ietf- mobike-design-00.txt, Work in Progress, June. 2004.
[9] F. Dupont, "Address Monogement for IKE Version 2", Internet droft, Network Working Group, droft-dupont-ikev2- oddrmgmt-06 .txf, Work in Progress, Oct. 2004.
[10] R. S. Chong, W Y. Chen, ond Y. F. Wen "Hybrid wireless network protocols" , IEEE Trons. On Vehiculor Tech. , Vol. 52, No. 4, Jul, 2003.
[ I I ] D. 8. Johnson, ond D. A. Moltz, "Protocols for Adoptive Wireless ond Mobile Networking" , IEEE Personol Communications, Vol, 3, No. I , pp. 34-42, Feb. I 996
[12] R Bhagwat, and C. E. Perkins, "Highly dynamic destination-sequenced distance-vector routing CDSDV) for mobile computers", SIGCOMM Conf. Process, pp, 234-244, Sep. I 994.
[13] C. C. Chiang, and M. Gerla, "Routing and multicast in multihop, mobile wireless networks", Proc. of the IEEE ICUPC, pp. 546-551, I 997.
[14] D. B. Johnson, "Routing in Ad Hoc Networks of Mobile Hosts" , Proc, of the IEEE Workshop on Mobile Computing . Systems and Applications, Dec. I 994.
[15] H. Crawczyk, "SIGMA: the 'SlGn-and-MAC' Approach to authenticated Diffie-Hellman protocoi", in Proc. of the Crypto Conference, 2003.
[ I 6] R. Canetti and H. Krawczyk, "Security analysis of IKE's signature-based key-exchange protocoi", in Proc. of the Crypto Conference, Aug. 2002.
[17] W T. Strayer, and A. C. Weaver, "Performance Measurements of data transfer services in MAP", IEEE Network, vol. 2, no. 3, May I 988.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.