Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
Mobile IP; Design Principles and Practices
Mobile IP; Design Principles and Practices
Securing IPv6 neighbor and router discovery
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Security of Internet Location Management
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Distributed Systems: Principles and Paradigms (2nd Edition)
Distributed Systems: Principles and Paradigms (2nd Edition)
Hi-index | 0.00 |
Improvements have been seen with a jump from 2G to 3G in terms of security. Yet security issues persist and will continue to plague mobile communications into the leap to 4G if not addressed. 4G will use an architecture known as mobile IP. One particular security issue involves the route optimisation technique, which deals with binding updates. This paper introduces a distributed authentication protocol. It attempts to solve the security vulnerabilities of binding updates and at the same time over come the short falls of other security solutions by using currently existing technology without introducing any new hardware. The introduction of distributed authentication is aimed at alleviating mobile devices from processor intensive calculations while maintaining a high level of security.