On AAA Based on Brokers and Pre-encrypted Keys in MIPv6
نویسندگان
چکیده
For providing mobility services for users through the global Internet, Mobile IP (MIP) has been standardized by IETF. Since conventional MIP has been investigated without the support of the security, IETF suggests that the current servers capable of performing the authentication, authorization, and accounting (AAA) be used for secure services. However the quality of service (QoS) may be degraded due to inefficiency on integrating the conventional MIP and AAA. For this, we propose a fast and secure handoff mechanism based on IDentification Key (IDK) along with Authentication Value (AV). Also we evaluate the performance of the proposed scheme in terms of the probability of handoff failure and average latency. The results show that our proposed mechanism yields better performance than session key exchange mechaism [11] and ticket based one [12] while maintaining the similar level of security.
منابع مشابه
Topologically-Aware AAA Overlay Network in Mobile IPv6 Environment
In mobile IPv6 network, AAA mechanism is necessary for administration and security because roaming nodes are permitted and become majority. However, disharmonies are exposed when MIPv6 meets AAA. On one hand, AAA procedures increase the latency of MIPv6 handover by inserting several message round trips before mobile registration. Thus the handover performance is reduced. On the other hand, AAA ...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملClassification of encrypted traffic for applications based on statistical features
Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...
متن کاملAn Efficient Authentication Procedure for Fast Handoff in Mobile IPv6 Networks
Mobile IP (MIP) has been paid a lot of attention as a good candidate to provide such global mobility among heterogeneous networks. And, IPv6 incorporates the mobility into its extended function which is referred to as mobile IPv6 (MIPv6). On the other hand, authentication, authorization and accounting (AAA) service now plays an important role in many networks. Considering the future popularity ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005