Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Mobile IP; Design Principles and Practices
Mobile IP; Design Principles and Practices
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Hi-index | 0.00 |
Existing systems were created to work in a fixed and sometimes portable environment and, although it is possible to applied them in a wireless mobile environment, it is foreseen that they will have an impact in the performance and functionality of the system, threatening the absolute usability of the advantages provided by this new technology. Of our interest is the Internet Protocol Security (IPSEC), used mainly to create secure communications through public network infrastructure, i.e. Internet, by associating security parameters with the node's network address. This document introduces Mobile Virtual Private Network (MVPN), a novel protocol that provides the services of registration request authentication, key exchange, integrity, data origin authentication, anti-replay protection and confidentiality for the establishment of Secure Communication Channels in a wireless mobile environment, therefore representing a first step towards the optimisation of IPSEC.