2010 IEEE Wireless Communication and Networking Conference 2010
DOI: 10.1109/wcnc.2010.5506193
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Multi-Hop Mobile IP Registration Scheme for MANET-Internet Integrated Architecture

Abstract: Mobile Nodes (MNs) in the Mobile Ad hoc Network (MANET) employ multi-hop relaying techniques to exchange messages. These MNs are not globally reachable by nodes in the Internet. Adding Mobile IP protocol capabilities to MANETs grants the MNs the required Internet reachability. Several security and performance issues are introduced as a result of incorporating MANETs with Mobile IP. In this paper, we propose a secure and efficient multi-hop Mobile IP registration scheme for the MANET-Internet integrated archite… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Conversely, a symmetric key-based authentication scheme for multihop Mobile IP is proposed in [25]. In the work, a mobile node authenticates itself to its home authentication server, which derives a group of keys to be used by mobile nodes.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Conversely, a symmetric key-based authentication scheme for multihop Mobile IP is proposed in [25]. In the work, a mobile node authenticates itself to its home authentication server, which derives a group of keys to be used by mobile nodes.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
“…AMA [28] and the GMSP [24] require time for signing and verifying signatures (T s , T v ); hence, their computation overheads are higher than that in MA-PMIP. Similarly, the multihop MIP scheme [25] consumes a time T EAP in achieving the Extensible Authentication Protocol, which includes at least one signature and one verification.…”
Section: B Authentication Computation and Communication Overheadsmentioning
confidence: 99%
“…Secondly quality of service (QoS) support in VA NET to send and receive data packets should be performed in particu lar time variants. Quality of service parameters in VA NET need to be evaluated to check the s ervice requirements that need to be met by the network while transporting a packet stream from source to destination [6] [7].…”
Section: Introductionmentioning
confidence: 99%