Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A public-key based secure mobile IP
Wireless Networks
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A Novel Distributed Dynamic Location Management Scheme for Minimizing Signaling Costs in Mobile IP
IEEE Transactions on Mobile Computing
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
ISPAN '99 Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms and Networks
Performance Analysis of Cryptographic Protocols on Handheld Devices
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
A modular correctness proof of IEEE 802.11i and TLS
Proceedings of the 12th ACM conference on Computer and communications security
Security analysis of network protocols: compositional reasoning and complexity-theoretic foundations
Security analysis of network protocols: compositional reasoning and complexity-theoretic foundations
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Theoretical Computer Science
Secure and scalable mobile IP registration scheme using PKI
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
A solution to mobile IP registration for AAA
CIC'02 Proceedings of the 7th CDMA international conference on Mobile communications
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
Efficient authentication and key distribution in wireless IP networks
IEEE Wireless Communications
Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks
IEEE Wireless Communications
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
A secure and efficient registration for IP mobility
Proceedings of the First International Conference on Security of Internet of Things
A methodology to counter DoS attacks in mobile IP communication
Mobile Information Systems
Hi-index | 0.01 |
A secure and efficient ID-based registration protocol with user anonymity is proposed in this paper for IP-based mobile networks. The protocol minimizes the registration delay through a minimal usage of the identity (ID)-based signature scheme that eliminates expensive pairing operations. User anonymity is achieved via a temporary identity (TID) transmitted by a mobile user, instead of its true identity. Additional replay protection from a Foreign Agent (FA) is included in the registration messages to prevent a possible replay attack. A formal correctness proof of the protocol using Protocol Composition Logic (PCL) is presented. Numerical analysis and computer simulation results demonstrate that the proposed protocol out-performs the existing ones in terms of the registration delay, the registration signaling traffic, and the computational load on a Mobile Node (MN) while improving security. For example, the proposed protocol reduces the registration delay up to 49.3 percent approximately, comparing to Yang's protocol.