2009
DOI: 10.1002/sec.135
|View full text |Cite
|
Sign up to set email alerts
|

On predictive routing of security contexts in an all‐IP network

Abstract: While mobile nodes (MNs) undergo handovers across inter-wireless access networks, their security contexts must be propagated for secure re-establishment of on-going application sessions, such as those in secure mobile internet protocol (IP), authentication, authorization, and accounting (AAA) services. Routing security contexts via an IP network either on-demand or based on MNs' mobility prediction, imposes new challenging requirements of secure cross-handover services and security context management. In this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…The implementation of these functions is firmly based on the assumption that the network nodes are trustworthy and the received routing information is correct. However, such assumption can become invalid in realistic networks as the routing infrastructure is not reliable due to numerous reasons [6][7][8] and the two key reasons are as follows: 1) the existing routing protocols take none or little security mechanisms into consideration in its design so that the attackers can degrade the routing infrastructure by fabricating updating routing information; and 2) routing protocols generally do not have strategies to prevent the network from active attacks. As a result, the adversary users can inform other routers with false routing information, and hence attack the network.…”
Section: Introductionmentioning
confidence: 99%
“…The implementation of these functions is firmly based on the assumption that the network nodes are trustworthy and the received routing information is correct. However, such assumption can become invalid in realistic networks as the routing infrastructure is not reliable due to numerous reasons [6][7][8] and the two key reasons are as follows: 1) the existing routing protocols take none or little security mechanisms into consideration in its design so that the attackers can degrade the routing infrastructure by fabricating updating routing information; and 2) routing protocols generally do not have strategies to prevent the network from active attacks. As a result, the adversary users can inform other routers with false routing information, and hence attack the network.…”
Section: Introductionmentioning
confidence: 99%