Building identity-based security associations for provider-provisioned virtual private networks

被引:1
|
作者
Khaled Masmoudi
Hossam Afifi
机构
[1] Institut National des Télécommunications,RS2M department
来源
Telecommunication Systems | 2008年 / 39卷
关键词
IPsec security associations; Internet key exchange protocol; Provider-provisioned VPNs; Applied identity-based cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Provider-provisioned virtual private networks are nowadays well-established networking concepts. They are envisaged as an extension of the basic VPN concept to securely network low-capacity nodes in large-scale personal networks, with the help of network providers. This article presents an adaptation of the Internet Key Exchange (IKEv2) protocol to the context of dynamic tunneling in personal networks. It relies on the providers’ infrastructure to build identity-based security associations. Results of a preliminary security analysis are also provided.
引用
收藏
页码:215 / 222
页数:7
相关论文
共 50 条
  • [31] ZigBee security using identity-based cryptography
    Nguyen, Son Thanh
    Rong, Chunming
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 3 - +
  • [32] On the Security of an Identity-Based Aggregate Signature Scheme
    Yap, Wun-She
    Heng, Swee-Huay
    Goi, Bok-Min
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1523 - +
  • [33] Security Analysis of An Identity-Based Mix Net
    Yajam, Habib Allah
    Mahmoodi, Ali
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [34] An identity-based model for grid security infrastructure
    Huang, XQ
    Chen, L
    Huang, LP
    Li, ML
    ADVANCED DISTRIBUTED SYSTEMS, 2005, 3563 : 258 - 266
  • [35] A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography
    Srivastava, Gaurav
    Agrawal, Richa
    Singh, Kunwar
    Tripathi, Rajeev
    Naik, Kshirasagar
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 348 - 367
  • [36] IDSP: A New Identity-Based Security Protocol for Cluster-Based Wireless Sensor Networks
    Mezrag, Fares
    Bitam, Salim
    Mellouk, Abdelhamid
    IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2019, 2019-September
  • [37] IDSP: A New Identity-Based Security Protocol for Cluster-Based Wireless Sensor Networks
    Mezrag, Fares
    Bitam, Salim
    Mellouk, Abdelhamid
    2019 IEEE 30TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2019, : 502 - 507
  • [38] A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography
    Gaurav Srivastava
    Richa Agrawal
    Kunwar Singh
    Rajeev Tripathi
    Kshirasagar Naik
    Peer-to-Peer Networking and Applications, 2020, 13 : 348 - 367
  • [39] IDENTITY-BASED INFORMATION SECURITY MANAGEMENT-SYSTEM FOR PERSONAL-COMPUTER NETWORKS
    OKAMOTO, E
    TANAKA, K
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1989, 7 (02) : 290 - 294
  • [40] Private Key Management in Hierarchical Identity-Based Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Guo, Fuchun
    SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 206 - 212