Performance Analysis of Proxy-AAA Authentication Scheme in PMIPv6 Networks with Forwarding Mode Supporting

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Performance Analysis of Sensor Proxy-AAA Authentication Scheme Based on Fast Handover and Forwarding Mode for IP-based Internet of Things

Recen tly interest in Internet of Things(I oT) is increasing, and a variety of the security technol ogies tha t are suitable for Internet of Things has being studied. In order to main tain the trustw orth y connectivity and the accessibility of distributed IoT, it is importan t to establish secure links for endto-end comm unica tion with proper authen tica tion. AAA technol ogy is curren tly th...

متن کامل

Performance analysis of pointer forwarding scheme for wireless cellular networks

xanfingScheme (PFS) and pment andyticd fonnohe to compote the tow colts. NomerIcfr.1 rerulh show that the trrditiond ap0neIId.l appmrimadon may lead to lneomft drdrion making In the laation mmagement scheme nowevv, our a n m e a l ,-ita be el t i , . osed to find the .p pmprhte parsmeters In PFS. currently visiting the associated RA. There are two basic operations in the location management reg...

متن کامل

Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme

In vehicular ad hoc networks, message authentication using proxy vehicles was proposed to reduce the computational overhead of roadside unites. In this type of message authentication schemes, proxy vehicles with verifying multiple messages at the same time improve computational efficiency of roadside unites when there are a large number of vehicles in their coverage areas. In this paper, first ...

متن کامل

Performance Evaluation of Aaa / Mobile Ip Authentication

This article1 describes a simulation study of the performance of the current IETF approach to authenticating mobile nodes by means of an integrated Authentication, Authorization and Accounting (AAA) infrastructure. The main findings of the study are: 1) the delay experienced by a mobile node in case of a full authentication dialogue involving entities of the mobile node’s home network is largel...

متن کامل

Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks

In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Korean Society for Internet Information

سال: 2012

ISSN: 1598-0170

DOI: 10.7472/jksii.2012.13.1.15