Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4 


Vol. 32,  No. 4, pp. 191-199, Apr.  2007


PDF
  Abstract

Mobile node has to register its current location to Home Agent when it moves to another network while away from home. However, the registration procedure cannot be completed successfully when Home Agent is protected by the VPN gateway which guards MN's home network and discards the unauthorized packets incoming from outside as a lack of security association(SA) between the Care-of address and security policy of the home network so that the binding registration message without SA is discarded smoothly by the VPN gateway. This paper presents the authentication and key exchange scheme using the AAA infrastructure for a user in Internet to access the home network behind the VPN gateway. By defining the role of authentication and tunnel processing for each agent or relay entity, this paper presents the procedure to register the current location to its Home Agent with secure manner. Performance result shows cost improvement up to 40% comparing with existing scheme in terms of the packet loss cost, the property of mobility and traffic.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

M. Kim and Y. Mun, "Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4," The Journal of Korean Institute of Communications and Information Sciences, vol. 32, no. 4, pp. 191-199, 2007. DOI: .

[ACM Style]

Miyoung Kim and Youngsong Mun. 2007. Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4. The Journal of Korean Institute of Communications and Information Sciences, 32, 4, (2007), 191-199. DOI: .

[KICS Style]

Miyoung Kim and Youngsong Mun, "Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4," The Journal of Korean Institute of Communications and Information Sciences, vol. 32, no. 4, pp. 191-199, 4. 2007.