2012 IFIP Wireless Days 2012
DOI: 10.1109/wd.2012.6402807
|View full text |Cite
|
Sign up to set email alerts
|

MUSeS: Mobile User Secured Session

Abstract: Mobility and security are very important services for both current and future network infrastructures. However, the integration of mobility in traditional virtual private networks is difficult due to the costs of reestablishing broken secure tunnels and restarting broken application connections. In order to address this issue, we propose a new communication system called Mobile User Secured Session. Based upon a peer-to-peer overlay network, it provides security services to the application layer connections of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
3
3

Relationship

5
1

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…In this section, we present a functional analysis as well as the experiment environment and the results of the evaluation of our approach SEMOS [5] and three stateof-the-art solutions, namely: N2N, HIP and MOBIKE. Mobility support packets for these two phases of communication.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we present a functional analysis as well as the experiment environment and the results of the evaluation of our approach SEMOS [5] and three stateof-the-art solutions, namely: N2N, HIP and MOBIKE. Mobility support packets for these two phases of communication.…”
Section: Discussionmentioning
confidence: 99%
“…After each connection disruption, key renegotiation process is needed to restore broken tunnel. In order to adress network failures resulting from location changes or network reconfigurations, several solutions were proposed in the literature [2][3][4][5][6][7] . This work surveys the state-of-the-art in the area of mobile VPN systems, identifies recent research directions and experiments on some open source mobile VPN applications.…”
Section: Introductionmentioning
confidence: 99%
“…This paper is an extended version of our previous work presented at Wireless Days 2012 in Dublin [2]. This new version includes an exhaustive state of the art, a more detailed description of the SEMOS underlying P2P overlay network called CLOAK and a comparative evaluation of three existing similar and open source solutions (i.e., HIP, MOBIKE and N2N), with respect to features and latency performances.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, we have extended MUSeS properties by adding several useful design features. In order to avoid name conflicts, we have also changed the name of our solution from MUSeS in [2] to SEMOS in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…D. Ahmat et al In our related work [2], we have proposed an approach to address the security issues of communication sessions when users are mobile across networks. As this approach, which is targeting user-level applications, is based on a P2P network, it can leverage the solution proposed in this paper.…”
Section: Introductionmentioning
confidence: 99%