IPv6—the new Internet protocol (2nd ed.)
IPv6—the new Internet protocol (2nd ed.)
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Securing IPv6 neighbor and router discovery
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Protecting AODV against impersonation attacks
ACM SIGMOBILE Mobile Computing and Communications Review
Defending against redirect attacks in mobile IP
Proceedings of the 9th ACM conference on Computer and communications security
Mobile 4-in-6: A Novel Mechanism for IPv4/v6 Transitioning
IDMS '01 Proceedings of the 8th International Workshop on Interactive Distributed Multimedia Systems
Revised Papers from the 9th International Workshop on Security Protocols
Experiences of Mobile IP Security
Revised Papers from the 9th International Workshop on Security Protocols
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
Revised Papers from the 9th International Workshop on Security Protocols
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Crypto-based identifiers (CBIDs): Concepts and applications
ACM Transactions on Information and System Security (TISSEC)
Secure long term communities in ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Cryptographically Generated Addresses for Constrained Devices*
Wireless Personal Communications: An International Journal
Efficient security for IPv6 multihoming
ACM SIGCOMM Computer Communication Review
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
Improved topology assumptions for threshold cryptography in mobile ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
Key management and delayed verification for ad hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
Routing optimization security in mobile IPv6
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure Node Discovery in Ad-hoc Networks and Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Distributed authentication protocol for the security of binding updates in mobile IPv6
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Securing user-controlled routing infrastructures
IEEE/ACM Transactions on Networking (TON)
An improved address ownership in mobile IPv6
Computer Communications
Random Visitor: Defense against Identity Attacks in P2P Networks
IEICE - Transactions on Information and Systems
Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents
EHAC'09 Proceedings of the 8th WSEAS international conference on Electronics, hardware, wireless and optical communication
Analysis and Optimization of Cryptographically Generated Addresses
ISC '09 Proceedings of the 12th International Conference on Information Security
A secure and lightweight approach for routing optimization in mobile IPv6
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Random visitor: a defense against identity attacks in P2P overlay networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A ticket based binding update authentication method for trusted nodes in mobile IPv6 domain
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Integrating identity based cryptography with cryptographically generated addresses in mobile IPv6
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Towards formal analysis of wireless LAN security with MIS protocol
International Journal of Ad Hoc and Ubiquitous Computing
Limitations of IPsec policy mechanisms
Proceedings of the 11th international conference on Security Protocols
Trust-based route selection in dynamic source routing
iTrust'06 Proceedings of the 4th international conference on Trust Management
Towards security analysis to binding update protocol in mobile IPv6 with formal method
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
MIPv6 binding update protocol secure against both redirect and dos attacks
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
BLIND: a complete identity protection framework for end-points
SP'04 Proceedings of the 12th international conference on Security Protocols
A new authentication scheme of binding update protocol on handover in mobile IPv6 networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
P6P: a peer-to-peer approach to internet infrastructure
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
IP address authorization for secure address proxying using multi-key CGAs and ring signatures
IWSEC'06 Proceedings of the 1st international conference on Security
Ticket-Based binding update protocol for mobile IPv6
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Privacy issues in vehicular ad hoc networks
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Enhancing MISP with Fast Mobile IPv6 Security
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.00 |
We present a unilateral authentication protocol for protecting IPv6 networks against abuse of mobile IPv6 primitives. A mobile node uses a partial hash of its public key for its IPv6 address. Our protocol integrates distribution of public keys and protects against falsification of network addresses. Our protocol is easy to implement, economic to deploy and lightweight in use. It is intended to enable experimentation with (mobile) IPv6 before the transition to a comprehensive IPSEC infrastructure.