Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking - MobiCom '97 1997
DOI: 10.1145/262116.262145
|View full text |Cite
|
Sign up to set email alerts
|

A public-key based secure mobile IP

Abstract: The need for scalable key management support for Mobile IP -especially, the route-optimized Mobile IP -is well known. In this paper, we present the design and the first implementation of a public hey management system that can be used with IETF Mobile IP. The system, called the Mobile IP Security (MoIPS) system, was built upon a DNS based X.509 Public Key Infastructure with innovation in certificate and CRL dispatch as well as light-weight hey generation. The system can be used to supply hey parameters for aut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2002
2002
2012
2012

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(24 citation statements)
references
References 9 publications
0
24
0
Order By: Relevance
“…[2], [9] None None MAC (Static key) Protocol in [10] Symmetric encryption Symmetric encryption Symmetric encryption Protocol in [11] None Certified public key Certified public key Protocol in [13] None None Symmetric encryption Lam [15] None None Digital Signature Protocol in [16] None None MAC Protocol in [17] Digital Signature Digital Signature Digital Signature Protocol in [18] IPSec Tunnelling Tunnelling with firewall IPSec Tunnelling Protocol in [19] Certificate from CA Certificate from CA Certificate from CA Yang [23] None Digital Signature Symmetric encryption Protocol in [24] Signature Signature Signature Protocol in [27] PKI Certificate & MAC PKI Certificate & MAC PKI Certificate &MAC Protocols in [28], [29] HMAC HMAC HMAC Protocols in [31], [33] None MAC (static/dynamic key) MAC (dynamic key) Protocol in [47] None Digital Signature MAC (dynamic key) Protocol in [50] Certificate Certificate Certificate Protocol in [51] TTP MAC (static/dynamic key) MAC (dynamic key) Protocol in [52] None MAC (static/dynamic key) MAC (dynamic key) ID Based [71] None IBS without pairings MAC (dynamic key) ______________________________________________________________________________________________________ …”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
See 1 more Smart Citation
“…[2], [9] None None MAC (Static key) Protocol in [10] Symmetric encryption Symmetric encryption Symmetric encryption Protocol in [11] None Certified public key Certified public key Protocol in [13] None None Symmetric encryption Lam [15] None None Digital Signature Protocol in [16] None None MAC Protocol in [17] Digital Signature Digital Signature Digital Signature Protocol in [18] IPSec Tunnelling Tunnelling with firewall IPSec Tunnelling Protocol in [19] Certificate from CA Certificate from CA Certificate from CA Yang [23] None Digital Signature Symmetric encryption Protocol in [24] Signature Signature Signature Protocol in [27] PKI Certificate & MAC PKI Certificate & MAC PKI Certificate &MAC Protocols in [28], [29] HMAC HMAC HMAC Protocols in [31], [33] None MAC (static/dynamic key) MAC (dynamic key) Protocol in [47] None Digital Signature MAC (dynamic key) Protocol in [50] Certificate Certificate Certificate Protocol in [51] TTP MAC (static/dynamic key) MAC (dynamic key) Protocol in [52] None MAC (static/dynamic key) MAC (dynamic key) ID Based [71] None IBS without pairings MAC (dynamic key) ______________________________________________________________________________________________________ …”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Replay attack prevention Location privacy ______________________________________________________________________________________________________ Base protocol [2], [9] None None Protocol in [11] Yes (Nonce) None Protocol in [12] None None Protocol in [13] Yes (Secret key & Timestamp) None Protocol in [14] Yes (Timestamp or Nonce) Yes (Identification number) Protocol in [17] Yes (Nonce) None Protocol in [21] Yes (Timestamp) None Protocol in [24] Yes (Identity) None Protocol in [40] Yes (Nonces) Yes (TID) Protocol in [47] Yes (Nonce) None Protocol in [48] Yes (ID-Based Secure Session key) None Protocols in [53], [61] Yes (Nonces) Yes (TID & Hash value) Protocol in [71] Yes (Temporary entries) Yes (Temporary number) Protocol in [72] Yes (Session key) Yes (Dynamic anonymity) Protocol in [75] Yes (Timestamp or Nonce) None Protocols in [76], [77] Yes (Timestamp & Nonce) Yes (TMSI & Sym.encryption) Protocol in [79] Yes (Secure key) Yes (TID) Protocol in [81] Yes ( …”
Section: Registration Protocolmentioning
confidence: 99%
“…A public key based secure Mobile IP was proposed by Zao et al [75] in their Mobile IP Security System (Mo-IPS) was based on a DNS based X.509 PKI and the innovation in cross certification and zero-message key generation. This proposal attempts to provide solution for alteration, masquerading and eavesdropping attacks by means of key management and cryptographic keys for authentication, access control and using secure tunneling.…”
Section: Security Approaches For Mobile Agent Attacked By the Hostmentioning
confidence: 99%
“…Currently, many MIP protocol [3][4][5] were proposed based on traditional Certificate-based Public Key Cryptology (CA-PKC), but those schemes suffered from great security cost and throughput due to inherent issue of the certificate management. Refs.…”
Section: Introductionmentioning
confidence: 99%