2003
DOI: 10.1007/3-540-44843-8_24
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Scalable Mobile IP Registration Scheme Using PKI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…An identity based secure session key (ID based SSK) is proposed 11 to attain a better performance and to exclude the time consuming certificate based operations. In this approach, Authentication, Authorization and Accounting (AAA) protocol 12 is combined with the ID based scheme for reduction in registration latency up to about 63 per cent compared to the existing ID based protocols [13][14][15] . The two protocols time invariant and time variant 16 are proposed to the improvement of the IP mobility registration that uses a self certified key exchange to generate the secret key.…”
Section: Figure 1 Ip Mobility Environment -Mn's Attachment With Forementioning
confidence: 99%
“…An identity based secure session key (ID based SSK) is proposed 11 to attain a better performance and to exclude the time consuming certificate based operations. In this approach, Authentication, Authorization and Accounting (AAA) protocol 12 is combined with the ID based scheme for reduction in registration latency up to about 63 per cent compared to the existing ID based protocols [13][14][15] . The two protocols time invariant and time variant 16 are proposed to the improvement of the IP mobility registration that uses a self certified key exchange to generate the secret key.…”
Section: Figure 1 Ip Mobility Environment -Mn's Attachment With Forementioning
confidence: 99%
“…It is necessary and frequent process in the mobile communication network not to disconnect service session during the handoff, this registration scheme [18] was suggested a new optimized registration process with authentication using PKI. Normally, the followings include a secure mobile IP registration scheme using PKI 1) Initial registration is done when a mobile node turns its power on with its home network.…”
Section: Secure and Scalable Mip Registration Scheme Using Pkimentioning
confidence: 99%
“…[2], [9] None None MAC (Static key) Protocol in [10] Symmetric encryption Symmetric encryption Symmetric encryption Protocol in [11] None Certified public key Certified public key Protocol in [13] None None Symmetric encryption Lam [15] None None Digital Signature Protocol in [16] None None MAC Protocol in [17] Digital Signature Digital Signature Digital Signature Protocol in [18] IPSec Tunnelling Tunnelling with firewall IPSec Tunnelling Protocol in [19] Certificate from CA Certificate from CA Certificate from CA Yang [23] None Digital Signature Symmetric encryption Protocol in [24] Signature Signature Signature Protocol in [27] PKI Certificate & MAC PKI Certificate & MAC PKI Certificate &MAC Protocols in [28], [29] HMAC HMAC HMAC Protocols in [31], [33] None MAC (static/dynamic key) MAC (dynamic key) Protocol in [47] None Digital Signature MAC (dynamic key) Protocol in [50] Certificate Certificate Certificate Protocol in [51] TTP MAC (static/dynamic key) MAC (dynamic key) Protocol in [52] None MAC (static/dynamic key) MAC (dynamic key) ID Based [71] None IBS without pairings MAC (dynamic key) ______________________________________________________________________________________________________ …”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…TE Scheme accounts for additional delays occurring during MIP registration in each scheme. [12]. e Scheme for single and multi-hop FA discovery and MIP registration for the three schemes is found as follows: …”
Section: Introductionmentioning
confidence: 99%