Implementing IPv6: Supporting the Next Generation Internet Protocols
Implementing IPv6: Supporting the Next Generation Internet Protocols
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
Personal and Ubiquitous Computing
IPv6 Essentials
An Architecture for Mobility Support in a Next-Generation Internet
AINA '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications
Mobility management in ubiquitous environments
Personal and Ubiquitous Computing
Secure and efficient public key management in next generation mobile networks
Personal and Ubiquitous Computing
Personal and Ubiquitous Computing
Advanced security technologies and applications for ubiquitous computing
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Internet Key Exchange version 2 (IKEv2) is taking the responsibility for distribution and management of reliable authentication key. IKEv2 can secure fast hand off, confidentiality of data, safe transmission, and multihoming to transmission node. In this paper, we designed and constructed the network based on real mobile node and experimented the modeling of IKEv2 protocol through the simulation. We analyzed the resetting of authentication key and re-exchange problem. And we experimented the effect that key exchange is affected by a limited bandwidth based on data analysis. To overcome delay time, we proposed multi-interface of node and analyzed performance and latency for authentication setting and exchange process. The simulation results show that re-authentication of key is impossible to reset because of limited bandwidth of network. Also, the use of proposed multi-interface can minimize key exchange latency that happened by hand off for IPSec transmission.