2006
DOI: 10.1093/ietfec/e89-a.6.1842
|View full text |Cite
|
Sign up to set email alerts
|

A Key Management Scheme for Secure Mobile IP Registration Based on AAA Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Each user in the system can access this information through the public directory. On the other hand, besides the above assumptions, the authentication between HA and FA is based on the same assumptions found in (Kang and Park, 2006;Yang et al, 2003b).…”
Section: Security Analysismentioning
confidence: 76%
See 2 more Smart Citations
“…Each user in the system can access this information through the public directory. On the other hand, besides the above assumptions, the authentication between HA and FA is based on the same assumptions found in (Kang and Park, 2006;Yang et al, 2003b).…”
Section: Security Analysismentioning
confidence: 76%
“…In the registration period, the HA and MH can pre-share a secret key to be used for authenticating each other when the MH moves away from its home network. The authentication between HA and FA can be realized using an AAA (Authentication, Authorization, and Accounting) server (Kang and Park, 2006;Yang et al, 2003b), simultaneously providing authentication, authorization, and accounting among agents. Long et al (Long et al, 2004) pointed out the crash of the home AAA server or any failure of the network along the path from the visited network to the home network will prohibit the roaming user from being authenticated.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…For simplifying registration key distribution in Mobile IP registration, a new key management scheme [27] based on AAA Protocol is introduced and it reduces the delay connected with the AAA protocol. In order to build simplified key distribution and to reduce the delay caused by the AAA protocol, the registration key distribution in AAA protocol is disconnected from the base registration protocol.…”
Section: Secure Mip Registration Based On Aaamentioning
confidence: 99%
“…[2], [9] None None MAC (Static key) Protocol in [10] Symmetric encryption Symmetric encryption Symmetric encryption Protocol in [11] None Certified public key Certified public key Protocol in [13] None None Symmetric encryption Lam [15] None None Digital Signature Protocol in [16] None None MAC Protocol in [17] Digital Signature Digital Signature Digital Signature Protocol in [18] IPSec Tunnelling Tunnelling with firewall IPSec Tunnelling Protocol in [19] Certificate from CA Certificate from CA Certificate from CA Yang [23] None Digital Signature Symmetric encryption Protocol in [24] Signature Signature Signature Protocol in [27] PKI Certificate & MAC PKI Certificate & MAC PKI Certificate &MAC Protocols in [28], [29] HMAC HMAC HMAC Protocols in [31], [33] None MAC (static/dynamic key) MAC (dynamic key) Protocol in [47] None Digital Signature MAC (dynamic key) Protocol in [50] Certificate Certificate Certificate Protocol in [51] TTP MAC (static/dynamic key) MAC (dynamic key) Protocol in [52] None MAC (static/dynamic key) MAC (dynamic key) ID Based [71] None IBS without pairings MAC (dynamic key) ______________________________________________________________________________________________________ …”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%