Zero-knowledge proofs of identity
Journal of Cryptology
The design philosophy of the DARPA Internet Protocols
ACM SIGCOMM Computer Communication Review - Special twenty-fifth anniversary issue. Highlights from 25 years of the Computer Communication Review
A public-key based secure mobile IP
Wireless Networks
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
Routing optimization security in mobile IPv6
Computer Networks: The International Journal of Computer and Telecommunications Networking
An accurate and extensible mobile IPv6 (xMIPV6) simulation model for OMNeT++
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Analysis and Optimization of Cryptographically Generated Addresses
ISC '09 Proceedings of the 12th International Conference on Information Security
Integrating identity based cryptography with cryptographically generated addresses in mobile IPv6
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
International Journal of Communication Systems - Part 2: Next Generation Networks (NGNs)
Deploying Cryptography in Internet-Scale Systems: A Case Study on DNSSEC
IEEE Transactions on Dependable and Secure Computing
SP 800-57. Recommendation for Key Management, Part 1: General (revised)
SP 800-57. Recommendation for Key Management, Part 1: General (revised)
An overview of PKI trust models
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
The Network Mobility (NEMO) protocol is needed to support the world-wide mobility of aircraft mobile networks across different access networks in the future IPv6 based aeronautical telecommunications network (ATN). NEMO suffers from the constraint that all traffic has to be routed via the home agent though. The already existing correspondent router (CR) protocol solves this triangular routing problem and permits to route packets on a direct path between the mobile network and the ground based correspondent nodes. We identify security deficiencies of this protocol that make it unsuitable for use within the ATN. We therefore propose a new route optimization procedure based on the CR protocol that provides a higher level of security. We evaluate our new protocol in three ways. We first conduct a simulation based handover performance study using an implementation of a realistic aeronautical access technology. We then investigate the mobility signaling overhead. Finally, we specify a threat model applicable for the aeronautical environment and use it to perform a security analysis of both the old and our new protocol. It is shown that our protocol is not only more secure but also provides better handover latency, smaller overhead in the aeronautical scenario and a higher level of resilience when compared to the original CR protocol.