Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
Revised Papers from the 9th International Workshop on Security Protocols
Routing optimization security in mobile IPv6
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Secure Correspondent Router Protocol for NEMO Route Optimization
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
This paper proposes a mechanism to secure the mobile IPv6 networks by integrating identity based cryptosystem with cryptographically generated address. Based on an in-depth analysis of attacks and countermeasures in the CGA-based protocols, this paper gives an analysis of the so called "unauthentic key attacks", and presents a mechanism to solve this problem by integrating an IBC scheme called Combined Public Key (CPK) with CGA. Both the deployment considerations and performance analysis of this IBC-CGA scheme are present in the paper.