Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A public-key based secure mobile IP
Wireless Networks
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
ISPAN '99 Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms and Networks
Security analysis of network protocols: compositional reasoning and complexity-theoretic foundations
Security analysis of network protocols: compositional reasoning and complexity-theoretic foundations
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks
IEEE Transactions on Wireless Communications
An efficient certificateless signature scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
WINE'05 Proceedings of the First international conference on Internet and Network Economics
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
Efficient authentication and key distribution in wireless IP networks
IEEE Wireless Communications
A new authentication scheme with anonymity for wireless environments
IEEE Transactions on Consumer Electronics
IEEE Communications Magazine
Hi-index | 0.00 |
Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working group that allows the delivery of the packets to mobile nodes when they moves to a new network based on its old IP address. Due to the increase of fraudulent activities in the current world, wanted level for the security feature is increased. But usage of security must be provided without compromising the efficiency. In this paper a secure and efficient registration protocol is proposed for IP Mobility, as the security feature adopted is directly proportional to the registration delay time. This protocol provides security between the mobility agents using AES and HMAC algorithm with reduction in registration time. It also secures messages between a mobile node and agents, and analyses the various protocols in the Mobile IP environment with this approach, based on different features. Based on the numerical results, the proposed protocol outfits the existing protocol based on the security issues and registration competency. Here, an attempt has been made to simulate the Mobile IP scenario for the proposed protocol with the use of NS-2 [5] network simulator.