AUTHENTICATION METHOD FOR SECURE COMMUNICATION IN MOBILE IP

Main Article Content

Abdurahem El Atman Igrair
Dr,Raghav Yadav

Abstract

The world is now growing in connectivity and communication like never before through the application of different mobility based devices. Mobile devices such as mobile phones, laptops etc. have become important and convenient to use. Mobile IP enhances the Internet Protocol (IP) by providing mobile hosts with the IP routing service. With Mobile IP, a host is able to move from an IP subnetwork to another and yet maintain its active connections and reachability with its constant IP address called the home address, security requirements in mobile ip authentication of all registration messages becomes important research challenge. The security of such networks is mainly achieved with use of security and privacy aware of authentication protocols. Additionally, the efficiency of such networks is mainly depends on use of authentication protocols in mobile ip . There are many authentication protocols already presented by various researchers with objectives of privacy preserving, authentication and secure communications. But most of protocols are failed to achieve both efficient user authentication schema and secure communication while achieving the quality of service (QoS) requirements of mobile ip . For roaming services in mobile networks, Priauth authentication protocol schema recent designed which is showing the efficient performance in terms of time and overhead parameters. For mobile ip , along with privacy preservation, secure communication method designing is also challenging task. Therefore in this research work, HPriauth (Hybrid Priauth) authentication protocol schema is designed and implemented which is based on recent Privacy-Preserving Universal Authentication Protocol (Priauth). HPriauth aimed to present not only efficient user authentication services but also secure routing communication in mobile ip in order to defend against any types of security threats in mobile ip . For secure communication we are proposed ECC cryptography technique.

Downloads

Download data is not yet available.

Article Details

Section
Articles