Network Access Control Mechanism based on Locator/Identifier Split

被引:1
作者
Tu Rui [1 ]
Su Jinshu [1 ]
Chen Feng [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp Sci, Changsha, Hunan, Peoples R China
来源
NAS: 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE | 2009年
关键词
access control; Locator/Identifier Split; IBAC; Self-verifying Identifier; Identifier Spoofing;
D O I
10.1109/NAS.2009.34
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. "Locator/Identifier Split" has made it possible to build a network access control mechanism based on the permanent identifier. With the support of "Locator/Identifier Split" routing and addressing concept, the Identifier-based Access Control (IBAC) makes network access control more accurate and efficient, and fits for mobile nodes' access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet sender's identity without the third part authentication, which greatly reduces the probability of "Identifier Spoofing".
引用
收藏
页码:171 / 174
页数:4
相关论文
共 8 条
[1]  
*CERT CORP, 1998, ELL CURV CRYPT SYST
[2]  
JANSMA N, 2004, PERFORMANCE COMP ELL
[3]  
Johnson D., 2001, ELLIPTIC CURVE DIGIT
[4]  
MENEZES AJ, 1993, KLUWER INT SERIES EN
[5]  
Meyer D, 2008, INTERNET PROTOCOL J, V11, P23
[6]  
Scudder J., 2007, ROUTING ADDRESSING P
[7]  
TU R, 2009, COMPUTER ENG SCI, P9
[8]  
TU R, 2008, P IEEE ICACT 2008 PH, P66