2004
DOI: 10.1007/978-3-540-30108-0_19
|View full text |Cite
|
Sign up to set email alerts
|

Hindering Eavesdropping via IPv6 Opportunistic Encryption

Abstract: Abstract. This paper presents an opportunistic encryption scheme strictly layered on top of IPv6. Assuming that a node needs to send data toward another node, our proposal enables the dynamic configuration of an encrypted tunnel between the two nodes' IPsec gateways. The main contribution of this paper is to propose a solution that is fully distributed and does not rely on any global Trusted Third Party (such as DNSSEC or a PKI). The IPsec gateways are discovered using IPv6 anycast, and they derive authorizati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…The idea of encrypting the contents instead of encrypting the communication channels seeems very interesting [4]. We also believe that opportunistic encryption proposols than encrypt traffic transparently to the communicating nodes should also be considered [9,8].…”
Section: Discussionmentioning
confidence: 99%
“…The idea of encrypting the contents instead of encrypting the communication channels seeems very interesting [4]. We also believe that opportunistic encryption proposols than encrypt traffic transparently to the communicating nodes should also be considered [9,8].…”
Section: Discussionmentioning
confidence: 99%
“…Application layer proxies are used to encrypt the data transferred through the Onion Routing overlay network [6]. Castellucia et al [7] propose an authorization model based on cryptographic identifiers to establish IPsec tunnels between specific security gateways. In both cases, network layer tokens are protected only in the path between intermediate nodes, protection depends on confidence on third parties, and costly infrastructure is required.…”
Section: Dynamic Management Of Locators and Context Tags For The Fmentioning
confidence: 99%