Secure Route Optimization for Network Mobility Using Secure Address Proxying

نویسندگان

  • Manhee Jo
  • James Kempf
چکیده

In this paper, we propose a secure route optimization mechanism for network mobility management. By means of the mechanism, the Mobile Router securely proxies the care-of address for the Mobile Network Node. The Mobile Router sends a Binding Update directly to the Correspondent Node on behalf of the Mobile Network Node. The Binding Update binds the Mobile Network Node’s original address to the new care-of address. The Correspondent Node can verify that the Binding Update is sent from a node authorized to use the address. The Mobile Network Node authorizes the Mobile Router to proxy the address by using a Multi-key Cryptographically Generated Address to share the address ownership. In addition, through the binding procedure, the Mobile Router and the Correspondent Node securely exchange a session key, which enables a reduction in the handoff delay during binding update procedure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hierarchical Route Optimization Scheme Using Advanced Binding Update List (BUL+) for Nested Mobile Networks

Supporting networks that roam as one unit is needed to provide the transparency of Internet in mobile frameworks, like cars, trains, planes, buses, etc. To accomplish this, NEMO (Network Mobility) Basic Support protocol has been proposed and developed by Internet Engineering Task Force (IETF). Although, it achieves continuous, optimal and secure communication to and from all nodes, it still suf...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Intelligent Framework for Qos Optimization in Manet Using Soft Computing Models

Mobile Adhoc Networks (MANET) is a heterogeneous self configuring networks that changes topology often. Due to mobility nature of wireless nodes, routing information needs to be frequently updated. As nodes are wireless in nature, there exists enormous security threats that disturb the deployment and maintenance of MANET. To alleviate such problems, secure agent based multicast routing protocol...

متن کامل

Route Optimization and Location Updates for Mobile Hosts

Mobile hosts in a wireless network can move from one location to another while communicating with other hosts. A challenge is to provide seamless network access for mobile hosts and, at the same time, to retain compatibility with existing network protocols and applications. This paper addresses the issue of route optimization in IP mobility support that provides mobile hando and \triangle" rout...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006