2011
DOI: 10.1155/2011/148959
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing MISP with Fast Mobile IPv6 Security

Abstract: The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
8
1
1

Relationship

4
6

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…Since introduced by Burrows, Abadi, and Needham, BANlogic has been widely applied to security analysis on many security protocols due to its simplicity, intuitive, and robust [33][34][35]. For BAN-logic-based security analysis, a security protocol is (i) translated into an idealization form, (ii) its assumptions and goals are defined, and (iii) the BAN-logic rules are repeatedly applied to the idealized protocol to evolve its beliefs until the goals are satisfied.…”
Section: Security Analysis Based On Ban-logicmentioning
confidence: 99%
“…Since introduced by Burrows, Abadi, and Needham, BANlogic has been widely applied to security analysis on many security protocols due to its simplicity, intuitive, and robust [33][34][35]. For BAN-logic-based security analysis, a security protocol is (i) translated into an idealization form, (ii) its assumptions and goals are defined, and (iii) the BAN-logic rules are repeatedly applied to the idealized protocol to evolve its beliefs until the goals are satisfied.…”
Section: Security Analysis Based On Ban-logicmentioning
confidence: 99%
“…In this section, SPAM is formally analyzed through the BAN logic [8], which has been one of the most popular and widely used tools for the formal verification of security protocols [9], [10]. The notations and rules of the BAN logic are shown in Figs.…”
Section: Formal Verificationmentioning
confidence: 99%
“…A DoS attack is capable of harming any user or server connected to the Internet. You et al [49] proposed fast mobile IPv6 security by minimizing an involvement of the authentication server. A huge amount of work [11,17,21,25] has been done to prevent or mitigate this type of attack.…”
Section: Objectives and Motivationmentioning
confidence: 99%