SSL and TLS: designing and building secure systems
SSL and TLS: designing and building secure systems
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
Efficient, DoS-resistant, secure key exchange for internet protocols
Proceedings of the 9th ACM conference on Computer and communications security
Defending against redirect attacks in mobile IP
Proceedings of the 9th ACM conference on Computer and communications security
Security of Internet Location Management
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Secure Border Gateway Protocol (S-BGP)
IEEE Journal on Selected Areas in Communications
A Secure IPv6-based Urban Wireless Mesh Network (SUMNv6)
Computer Communications
Fault-tolerant design for wide-area Mobile IPv6 networks
Journal of Systems and Software
A secure and lightweight approach for routing optimization in mobile IPv6
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Experimental test-bed on security enhancement of Route Optimization in mobile IPv6 wireless networks
AsiaCSN '08 Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks
A ticket based binding update authentication method for trusted nodes in mobile IPv6 domain
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Integrating identity based cryptography with cryptographically generated addresses in mobile IPv6
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Access path based source address validation in mobile IPv6
NPC'11 Proceedings of the 8th IFIP international conference on Network and parallel computing
Journal of Network and Computer Applications
A Secure Correspondent Router Protocol for NEMO Route Optimization
Computer Networks: The International Journal of Computer and Telecommunications Networking
Review: A survey of secure protocols in Mobile IPv6
Journal of Network and Computer Applications
Hi-index | 0.00 |
Route Optimization (RO) in Mobile IPv6 (MIPv6) provides a mobile node (MN) the opportunity to eliminate the inefficient triangle routing with its corresponding node (CN) and therefore, greatly improves the network performance. However. in doing so. MIPv6 introduces several security vulnerabilities, and among them a major concern is the authentication and authorization of Binding Updates (BUs) during the RO process. Unauthenticated or malicious BUs open the door for many types of attacks. As every IPv6 node is expected to support MIPv6. mechanisms to secure BU will have a significant impact on the next generation Internet. In this paper, based on an in-depth analysis of the security weaknesses existing in previously proposed protocols, a light-weight BU protocol with high security strength is proposed, which makes use of public key certificate-based strong authentication technique. Another important contribution of the paper is the introduction of a novel and scalable 3-layer trust management framework, which takes advantage of IPv6 address format and home link's jurisdiction over the addresses it assigns, and thereby solves the difficult certificate issuing and management problem presented in the previous public key certificate-based solutions via trust delegation. The proposed protocol is highly efficient in term of both computation and communication costs on both MN and CN sides. An extended protocol is also proposed to explicitly support Hierarchical MIPv6 (HMIPv6).