Building identity-based security associations for provider-provisioned virtual private networks

被引:1
|
作者
Khaled Masmoudi
Hossam Afifi
机构
[1] Institut National des Télécommunications,RS2M department
来源
Telecommunication Systems | 2008年 / 39卷
关键词
IPsec security associations; Internet key exchange protocol; Provider-provisioned VPNs; Applied identity-based cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Provider-provisioned virtual private networks are nowadays well-established networking concepts. They are envisaged as an extension of the basic VPN concept to securely network low-capacity nodes in large-scale personal networks, with the help of network providers. This article presents an adaptation of the Internet Key Exchange (IKEv2) protocol to the context of dynamic tunneling in personal networks. It relies on the providers’ infrastructure to build identity-based security associations. Results of a preliminary security analysis are also provided.
引用
收藏
页码:215 / 222
页数:7
相关论文
共 50 条
  • [21] TIDS: Threshold and identity-based security scheme for wireless ad hoc networks
    Deng, Hongmei
    Agrawal, Dharma P.
    Ad Hoc Networks, 2004, 2 (03) : 291 - 307
  • [22] An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
    Sun, Jinyuan
    Zhang, Chi
    Zhang, Yanchao
    Fang, Yuguang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 21 (09) : 1227 - 1239
  • [23] IP virtual private networks - a service provider perspective
    Daniel, A
    IEE PROCEEDINGS-COMMUNICATIONS, 2004, 151 (01): : 62 - 70
  • [24] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [25] Circular and KDM Security for Identity-Based Encryption
    Alperin-Sheriff, Jacob
    Peikert, Chris
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 334 - 352
  • [26] An identity-based grid security infrastructure model
    Huang, XQ
    Chen, L
    Huang, LP
    Li, ML
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 314 - 325
  • [27] An Identity-Based Security Infrastructure for Cloud Environments
    Schridde, Christian
    Doernemann, Tim
    Juhnke, Ernst
    Freisleben, Bernd
    Smith, Matthew
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 644 - +
  • [28] Strong Forward Security in Identity-Based Signcryption
    Muniz, Madeline Gonzalez
    Laud, Peeter
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2013, 16 (4-5): : 235 - 258
  • [29] Identity-based encryption for sensor networks
    Oliveira, Leonardo B.
    Dahab, Ricardo
    Lopez, Julio
    Daguano, Felipe
    Loureiro, Antonio A. F.
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 290 - +
  • [30] Security of an identity-based cryptosystem and the related reductions
    Okamoto, T
    Uchiyama, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 546 - 560