2012
DOI: 10.1002/dac.2346
|View full text |Cite
|
Sign up to set email alerts
|

Distributed mapping management of identifiers and locators in mobile‐oriented Internet environment

Abstract: Many schemes have recently been proposed for the separation of identifier (ID) and locator (LOC), which include the Host Identity Protocol, the Identifier-Locator Network Protocol, and the Locator Identifier Separation Protocol. However, all of these schemes were originally designed in fixed network environment, rather than mobile network environment. In particular, these schemes are based on a centralized map server that is used as an anchor point for mobile nodes, and thus intrinsically subject to some limit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…Finally, we summarize the security and the functionality of our protocols and make comparisons with these aspects of related works [8][9][10][11][12][13][14][15][16][17][18][19] in Table I …”
Section: Discussion 6: Security Of Key Exchange Functionmentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, we summarize the security and the functionality of our protocols and make comparisons with these aspects of related works [8][9][10][11][12][13][14][15][16][17][18][19] in Table I …”
Section: Discussion 6: Security Of Key Exchange Functionmentioning
confidence: 99%
“…Finally, we summarize the security and the functionality of our protocols and make comparisons with these aspects of related works [8][9][10][11][12][13][14][15][16][17][18][19] in Table I. S1: Protect user and server secret parameters; S2: No password table and verification table; S3: Mutual authentication; S4: Fairness in key agreement; S5: Withstanding the replay attack; S6: Withstanding the insider attack; S7: Initiator anonymity; and S8: High security of the session key.…”
Section: Discussion 6: Security Of Key Exchange Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…It is worth noticing that many concepts and ideas explained in this section are explicitly inherited from the IP world, especially the notion of host identifiers (see for a full discussion on the use of node identifiers in mobility environments). However, their applicability to CCN has never been discussed because this new network architecture is exactly aimed at abandoning this approach based on a host‐centric vision of the network.…”
Section: Architecture Designsmentioning
confidence: 99%
“…With the advent of smart phones and various smart devices, the number of mobile users on the Internet is increasing explosively. This mobile trend has caused the rapid growth of the routing table size in routers [1,2]. To tackle the routing scalability issue, the Internet Engineering Task Force (IETF) has proposed the Identifier Locator Network Protocol (ILNP) protocol [3,4], which operates based on the address rewriting scheme.…”
Section: Introductionmentioning
confidence: 99%