A public-key based secure mobile IP

被引:32
|
作者
Zao, J [1 ]
Kent, S
Gahm, J
Troxel, G
Condell, M
Helinek, P
Yuan, N
Castineyra, I
机构
[1] GTE Internetworking BBN Technol Inc, Network Secur Dept, Cambridge, MA USA
[2] GTE Internetworking BBN Technol Inc, Adv Networking Dept, Cambridge, MA USA
[3] Ernst & Young LLP, Boston, MA USA
关键词
Information System; Communication Network; Location Management; Management Support; Management Message;
D O I
10.1023/A:1019179817993
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The need of scaleable key management support for Mobile IP, especially the route-optimized Mobile IP, is well known. In this paper, we present the design and the implementation of a public key management system that can be used with IETF basic and route optimized Mobile IP. The system, known as the Mobile IP Security (MoIPS) system, was built upon a DNS based X.509 Public Key Infrastructure and the innovation in cross certification and zero-message key generation. The system can supply cryptographic keys for authenticating Mobile IPv.4 location management messages and establishing IPSec tunnels for Mobile IP redirected packets. It can also be used to augment firewall traversal of Mobile IP datagrams. A FreeBSD UNIX implementation of the MoIPS prototype is available for non-commercial uses.
引用
收藏
页码:373 / 390
页数:18
相关论文
共 50 条
  • [21] Adaptively secure distributed public-key systems
    Frankel, Y
    MacKenzie, P
    Yung, M
    [J]. THEORETICAL COMPUTER SCIENCE, 2002, 287 (02) : 535 - 561
  • [22] Tightly secure signatures and public-key encryption
    Dennis Hofheinz
    Tibor Jager
    [J]. Designs, Codes and Cryptography, 2016, 80 : 29 - 61
  • [23] Tightly Secure Signatures and Public-Key Encryption
    Hofheinz, Dennis
    Jager, Tibor
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 590 - 607
  • [24] Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography
    Zhang, Xin
    Chen, Kejiang
    Ding, Jinyang
    Yang, Yuqi
    Zhang, Weiming
    Yu, Nenghai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3148 - 3163
  • [25] Adaptively-secure distributed public-key systems
    Frankel, Y
    MacKenzie, P
    Yung, M
    [J]. ALGORITHMS - ESA'99, 1999, 1643 : 4 - 27
  • [26] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [27] Multi-instance Secure Public-Key Encryption
    Brunetta, Carlo
    Heum, Hans
    Stam, Martijn
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 336 - 367
  • [28] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [29] A Forward-Secure Public-Key Encryption Scheme
    Ran Canetti
    Shai Halevi
    Jonathan Katz
    [J]. Journal of Cryptology, 2007, 20 : 265 - 294
  • [30] Towards logically and physically secure public-key infrastructures
    Viswanathan, K
    Saxena, A
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 122 - 134