RETRACTED: PKI and secret key based mobile IP security (Retracted Article)

被引:26
作者
Hu, Dong [1 ]
Zhou, Dong [1 ]
Li, Ping [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Commun & Informat Engn, Chengdu, Peoples R China
来源
2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING | 2006年
关键词
D O I
10.1109/ICCCAS.2006.284980
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There exist some circulations of internet drafts and specifications in today's industry for PKI implementation within the protocol of MIP, with or without the existence of IPSec. The focuses are particularly on how to fence off the unauthenticated or malicious bindings of Binding Updates that open the doors for various attacks and so as to also protect the Binding Updates messages to defend against redirection attacks in the challenging mobility environment. The paper firstly analyses the communication between MN-HA-CN on Return Routability (RR) and Route Optimization (RO), from both MIP and NEMO point of view. Then this paper introduces the innovative methods of implementing the secure communication of PKI together with the distribution of Secret Key methodology into the NEMO environment.
引用
收藏
页码:1605 / +
页数:2
相关论文
共 12 条
[1]  
ARKKO J, 2003, USING IPSEC PROTECT
[2]  
Conta A., 1998, 2473 RFC
[3]  
Deng R.H., 2002, P 9 ACM C COMP COMM, P59
[4]  
Devarapalli V., 2005, 3963 IETF RFC
[5]  
ERNST T, 2004, NETWORK MOBILITY SUP
[6]  
Johnson D., 2004, RFC3775 IETF, DOI IETF
[7]  
Krawczyk H., 1997, HMAC KEYED HASHING M, DOI DOI 10.17487/RFC2104
[8]  
PETRESCU A, 2004, THREATS BASIC NETWOR
[9]  
QIU Y, 2002, P WCNC 2004 NOV
[10]  
RESCORLA E, 2004, SURVEY AUTHENTICATIO