On AAA Based on Brokers and Pre-encrypted Keys in MIPv6

نویسندگان

  • Hoseong Jeon
  • Min Young Chung
  • Hyunseung Choo
چکیده

For providing mobility services for users through the global Internet, Mobile IP (MIP) has been standardized by IETF. Since conventional MIP has been investigated without the support of the security, IETF suggests that the current servers capable of performing the authentication, authorization, and accounting (AAA) be used for secure services. However the quality of service (QoS) may be degraded due to inefficiency on integrating the conventional MIP and AAA. For this, we propose a fast and secure handoff mechanism based on IDentification Key (IDK) along with Authentication Value (AV). Also we evaluate the performance of the proposed scheme in terms of the probability of handoff failure and average latency. The results show that our proposed mechanism yields better performance than session key exchange mechaism [11] and ticket based one [12] while maintaining the similar level of security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Topologically-Aware AAA Overlay Network in Mobile IPv6 Environment

In mobile IPv6 network, AAA mechanism is necessary for administration and security because roaming nodes are permitted and become majority. However, disharmonies are exposed when MIPv6 meets AAA. On one hand, AAA procedures increase the latency of MIPv6 handover by inserting several message round trips before mobile registration. Thus the handover performance is reduced. On the other hand, AAA ...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Classification of encrypted traffic for applications based on statistical features

Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...

متن کامل

An Efficient Authentication Procedure for Fast Handoff in Mobile IPv6 Networks

Mobile IP (MIP) has been paid a lot of attention as a good candidate to provide such global mobility among heterogeneous networks. And, IPv6 incorporates the mobility into its extended function which is referred to as mobile IPv6 (MIPv6). On the other hand, authentication, authorization and accounting (AAA) service now plays an important role in many networks. Considering the future popularity ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005