Binding Update Authentication Scheme for Mobile IPv6
Mobile IPv6 provides route optimization mechanism for fast communication by lessening the overhead of indirection. Although it ameliorates the communication latency but it also needs good authentication mechanism to make route optimization more effective and reliable. In this paper, we improve one o...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 114 |
---|---|
container_issue | |
container_start_page | 109 |
container_title | |
container_volume | |
creator | Ahmed, I. Tariq, U. Mukhtar, S. Kyung-suk Lhee Yoo, S.W. Piao Yanji ManPyo Hong |
description | Mobile IPv6 provides route optimization mechanism for fast communication by lessening the overhead of indirection. Although it ameliorates the communication latency but it also needs good authentication mechanism to make route optimization more effective and reliable. In this paper, we improve one of the route optimization security mechanisms called bombing resistant protocol, and propose a new binding update authentication scheme. Both mechanisms perform the care of address validation of the mobile node and maintain the integrity of the binding update message during binding update process, while the latter performs better in terms of latency and computation. They also resolve reflection and amplification, intensive computation problem. |
doi_str_mv | 10.1109/IAS.2007.21 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4299759</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4299759</ieee_id><sourcerecordid>4299759</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-f4346f8ce5f4c7bf647201b7bbfdc4d269447d418fb8d0ee6070d5d7f496e4003</originalsourceid><addsrcrecordid>eNpNzL1OwzAUQGEjhAS0nRhZ_AIJ186NbzyGip9IRVRqmas4vqZGbVIlBom3Z4CB6ehbjhA3CnKlwN419SbXAJRrdSaugYwtdUWGzv_jUiym6QMAlDVWkb4SeB97H_t3-XbybWJZf6Y99yl2bYpDLzfdno8swzDKl8HFA8tm_WXm4iK0h4kXf52J7ePDdvmcrV6fmmW9yqKFlAUs0ISq4zJgRy4YJA3KkXPBd-i1sYjkUVXBVR6YDRD40lNAaxgBipm4_d1GZt6dxnhsx-8damuptMUPSM1DUg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Binding Update Authentication Scheme for Mobile IPv6</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Ahmed, I. ; Tariq, U. ; Mukhtar, S. ; Kyung-suk Lhee ; Yoo, S.W. ; Piao Yanji ; ManPyo Hong</creator><creatorcontrib>Ahmed, I. ; Tariq, U. ; Mukhtar, S. ; Kyung-suk Lhee ; Yoo, S.W. ; Piao Yanji ; ManPyo Hong</creatorcontrib><description>Mobile IPv6 provides route optimization mechanism for fast communication by lessening the overhead of indirection. Although it ameliorates the communication latency but it also needs good authentication mechanism to make route optimization more effective and reliable. In this paper, we improve one of the route optimization security mechanisms called bombing resistant protocol, and propose a new binding update authentication scheme. Both mechanisms perform the care of address validation of the mobile node and maintain the integrity of the binding update message during binding update process, while the latter performs better in terms of latency and computation. They also resolve reflection and amplification, intensive computation problem.</description><identifier>ISBN: 0769528767</identifier><identifier>ISBN: 9780769528762</identifier><identifier>EISBN: 0769528767</identifier><identifier>EISBN: 9780769528762</identifier><identifier>DOI: 10.1109/IAS.2007.21</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Binding Update ; Care-of-Address ; Computer crime ; Delay ; Information security ; Key Management ; Maintenance ; Mobile communication ; Mobile computing ; Mobile IPv6 ; Protocols ; Reflection ; Route Optimization ; Testing ; Validation</subject><ispartof>Third International Symposium on Information Assurance and Security, 2007, p.109-114</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4299759$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4299759$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ahmed, I.</creatorcontrib><creatorcontrib>Tariq, U.</creatorcontrib><creatorcontrib>Mukhtar, S.</creatorcontrib><creatorcontrib>Kyung-suk Lhee</creatorcontrib><creatorcontrib>Yoo, S.W.</creatorcontrib><creatorcontrib>Piao Yanji</creatorcontrib><creatorcontrib>ManPyo Hong</creatorcontrib><title>Binding Update Authentication Scheme for Mobile IPv6</title><title>Third International Symposium on Information Assurance and Security</title><addtitle>ISIAS</addtitle><description>Mobile IPv6 provides route optimization mechanism for fast communication by lessening the overhead of indirection. Although it ameliorates the communication latency but it also needs good authentication mechanism to make route optimization more effective and reliable. In this paper, we improve one of the route optimization security mechanisms called bombing resistant protocol, and propose a new binding update authentication scheme. Both mechanisms perform the care of address validation of the mobile node and maintain the integrity of the binding update message during binding update process, while the latter performs better in terms of latency and computation. They also resolve reflection and amplification, intensive computation problem.</description><subject>Authentication</subject><subject>Binding Update</subject><subject>Care-of-Address</subject><subject>Computer crime</subject><subject>Delay</subject><subject>Information security</subject><subject>Key Management</subject><subject>Maintenance</subject><subject>Mobile communication</subject><subject>Mobile computing</subject><subject>Mobile IPv6</subject><subject>Protocols</subject><subject>Reflection</subject><subject>Route Optimization</subject><subject>Testing</subject><subject>Validation</subject><isbn>0769528767</isbn><isbn>9780769528762</isbn><isbn>0769528767</isbn><isbn>9780769528762</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpNzL1OwzAUQGEjhAS0nRhZ_AIJ186NbzyGip9IRVRqmas4vqZGbVIlBom3Z4CB6ehbjhA3CnKlwN419SbXAJRrdSaugYwtdUWGzv_jUiym6QMAlDVWkb4SeB97H_t3-XbybWJZf6Y99yl2bYpDLzfdno8swzDKl8HFA8tm_WXm4iK0h4kXf52J7ePDdvmcrV6fmmW9yqKFlAUs0ISq4zJgRy4YJA3KkXPBd-i1sYjkUVXBVR6YDRD40lNAaxgBipm4_d1GZt6dxnhsx-8damuptMUPSM1DUg</recordid><startdate>200708</startdate><enddate>200708</enddate><creator>Ahmed, I.</creator><creator>Tariq, U.</creator><creator>Mukhtar, S.</creator><creator>Kyung-suk Lhee</creator><creator>Yoo, S.W.</creator><creator>Piao Yanji</creator><creator>ManPyo Hong</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200708</creationdate><title>Binding Update Authentication Scheme for Mobile IPv6</title><author>Ahmed, I. ; Tariq, U. ; Mukhtar, S. ; Kyung-suk Lhee ; Yoo, S.W. ; Piao Yanji ; ManPyo Hong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-f4346f8ce5f4c7bf647201b7bbfdc4d269447d418fb8d0ee6070d5d7f496e4003</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Authentication</topic><topic>Binding Update</topic><topic>Care-of-Address</topic><topic>Computer crime</topic><topic>Delay</topic><topic>Information security</topic><topic>Key Management</topic><topic>Maintenance</topic><topic>Mobile communication</topic><topic>Mobile computing</topic><topic>Mobile IPv6</topic><topic>Protocols</topic><topic>Reflection</topic><topic>Route Optimization</topic><topic>Testing</topic><topic>Validation</topic><toplevel>online_resources</toplevel><creatorcontrib>Ahmed, I.</creatorcontrib><creatorcontrib>Tariq, U.</creatorcontrib><creatorcontrib>Mukhtar, S.</creatorcontrib><creatorcontrib>Kyung-suk Lhee</creatorcontrib><creatorcontrib>Yoo, S.W.</creatorcontrib><creatorcontrib>Piao Yanji</creatorcontrib><creatorcontrib>ManPyo Hong</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ahmed, I.</au><au>Tariq, U.</au><au>Mukhtar, S.</au><au>Kyung-suk Lhee</au><au>Yoo, S.W.</au><au>Piao Yanji</au><au>ManPyo Hong</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Binding Update Authentication Scheme for Mobile IPv6</atitle><btitle>Third International Symposium on Information Assurance and Security</btitle><stitle>ISIAS</stitle><date>2007-08</date><risdate>2007</risdate><spage>109</spage><epage>114</epage><pages>109-114</pages><isbn>0769528767</isbn><isbn>9780769528762</isbn><eisbn>0769528767</eisbn><eisbn>9780769528762</eisbn><abstract>Mobile IPv6 provides route optimization mechanism for fast communication by lessening the overhead of indirection. Although it ameliorates the communication latency but it also needs good authentication mechanism to make route optimization more effective and reliable. In this paper, we improve one of the route optimization security mechanisms called bombing resistant protocol, and propose a new binding update authentication scheme. Both mechanisms perform the care of address validation of the mobile node and maintain the integrity of the binding update message during binding update process, while the latter performs better in terms of latency and computation. They also resolve reflection and amplification, intensive computation problem.</abstract><pub>IEEE</pub><doi>10.1109/IAS.2007.21</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 0769528767 |
ispartof | Third International Symposium on Information Assurance and Security, 2007, p.109-114 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4299759 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Binding Update Care-of-Address Computer crime Delay Information security Key Management Maintenance Mobile communication Mobile computing Mobile IPv6 Protocols Reflection Route Optimization Testing Validation |
title | Binding Update Authentication Scheme for Mobile IPv6 |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T20%3A37%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Binding%20Update%20Authentication%20Scheme%20for%20Mobile%20IPv6&rft.btitle=Third%20International%20Symposium%20on%20Information%20Assurance%20and%20Security&rft.au=Ahmed,%20I.&rft.date=2007-08&rft.spage=109&rft.epage=114&rft.pages=109-114&rft.isbn=0769528767&rft.isbn_list=9780769528762&rft_id=info:doi/10.1109/IAS.2007.21&rft_dat=%3Cieee_6IE%3E4299759%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=0769528767&rft.eisbn_list=9780769528762&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4299759&rfr_iscdi=true |