Secure Vertical Handover to NEMO Using Hybrid Cryptosystem
نویسندگان
چکیده
To provide security to all pairs of nodes in network mobility (NEMO) while executing the handoff between different technologies, a hybrid cryptosystem with suitable selection mechanism is proposed. All nodes, i.e., Mobile Node (MN), Router (MR), Correspondent (CN) and MN, Home Agent (HA), respectively, are considered. A proper proposed confidentiality Bound Update (BU) during conversation MR, HA using elliptic curve cryptography (ECC). In this solution, based on user preference Received Signal Strength (RSS) heterogeneous network. The model can protect communication analysis from NEMO standard attacks. Whenever moves, MR intimates about address change receives Binding Acknowledgement (BA) as reply. During data (frame) exchange registration CN, HA, various threats arise. earlier work, only solution given, best algorithm not provided environment. Therefore, paper, contributed preferences. comparison drawn Return Routability Procedure (RRP). Authentication for MN CN. proof derived BAN logic. Many attacks have been successfully avoided communications. It has observed that achieves 2.4854% better throughput than existing models. Also, reduces latency packet loss by 2.7482% 3.8274%, respectively.
منابع مشابه
Secure and Efficient Vertical Handover in Heterogeneous Wireless Networks
-------------------------------------------------------------------ABSTRACT-------------------------------------------------------------Handover occurs when a wireless node switches from one network to another. One of the main requirements of this process is to make it secure by using reliable security mechanisms, but it can decrease performance as well. So it is very essential to maintain bala...
متن کاملVertical Handover Techniques Evaluation
Handover techniques are essential components of the heterogeneous wireless networks architecture development. Providing quality of service in conditions of seamless mobility is the major prerequisite for vertical handover high functionality and scalability. In this paper, the perspective vertical handover techniques, based on radio link quality and merit function of access network, are systemat...
متن کاملHow to construct secure proxy cryptosystem q
Proxy cryptosystem, first proposed by Mambo and Okamoto [M.Mambo, E. Okamoto, Proxy cryptosystem: delegation of a power to decrypt ciphertexts, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E80-A/1 (1997) 54–63], allows the original decryptor to delegate his decrypting capability to the proxies. However, until now, no practical proxy cryptosystem modes are proposed. Therefore, in this pap...
متن کاملSecure Handover Procedures
This paper presents some security issues of handover procedures with an emphasis on hybrid and high velocity networks. It describes functional as well as informational security problems that occur during handover procedures and presents how predicting the next cell during a handover procedure can help to solve these problems. A cell prediction is especially possible in track bounded wireless ne...
متن کاملA Seamless Vertical Handover Approach
Wireless network devices are equipped with multiple access technologies like UMTS and Wireless LAN. The handover between the technologies has been widely studied in literature. Several of these research papers build their handover mechanisms on top of existing protocols like Mobile IP. The protocols however, operate on the network layer and only react on link layer changes. Consequently, a seam...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2021/6751423