An IPSec-Based Key Management Algorithm for Mobile IP Networks

نویسندگان

  • Neng-Chung Wang
  • Jong-Shin Chen
  • Yung-Fa Huang
  • Tzu-Wei Chan
چکیده

The Mobile IP network environment for users is very vulnerable to malicious attacks, such as denial-of-service, man-in-the-middle, and other types of attacks. For protection, the IETF standard Mobile IP protocol is modified with IP security (IPSec) primitives, which control the packet flow from a mobile host through multiple security gateways. In addition, IPSec uses strong cryptographic authentication and encryption algorithms to protect the integrity and confidentiality of IP traffic. In this paper, we proposed a key management algorithm for Mobile IP networks based on IPSec. The proposed scheme includes two parts: a wired network and a wireless network. In the wired network part, the proposed scheme produce two keys in each security gateway, transfers a packet with an encrypted key and receives a packet with a decrypted key. In the wireless network part, we use AH to arrive at wireless segment packet security. By the proposed scheme, we can enhance the security of Mobile IP networks. Key-Words: Key management, IPSec, Mobile IP, Network security, Private key, Public key.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Management in IP-Based Mobile and Wireless Networks

Mobile and wireless networks pose a number of challenges in key management due to the lack of infrastructures such as routing, server, and organization/administrative infrastructures. Several mechanisms have been proposed to solve the problem of key management in mobile and wireless networks. In this paper we focus on key management in IP-based mobile and wireless networks. We first describe th...

متن کامل

Securing mobile IP enabled laptop

Mobile IP Onternet Protocol) enables access to the Internet anywhere with one IP address, hence, providing the flexibility that is required by today’s growing mobile work force. Deploying Mobile IP introduces new security h a t s that if not carefully addressed can have severe consequences for home organizations. IPSec is a commonly used protection mechanism that is employed in this context. IP...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

RFC 6618 TLS - Based MIPv

Mobile IPv6 signaling between a Mobile Node (MN) and its Home Agent (HA) is secured using IPsec. The security association (SA) between an MN and the HA is established using Internet Key Exchange Protocol (IKE) version 1 or 2. The security model specified for Mobile IPv6, which relies on IKE/IPsec, requires interaction between the Mobile IPv6 protocol component and the IKE/IPsec module of the IP...

متن کامل

NAT Traversal Capability and Keep-Alive Functionality with IPSec in IKEv2 Implementation

Since IPv4 Private Networks are behind NAT (Network Address Translation) devices. So, to bypass the Binding Update and Binding Acknowledgment by NAT, we need to encapsulate it in UDP (User datagram Protocol) Packets. Hence, the Dual Stack Mobile IPv6 should support NAT Traversal and Detection. So for proper securing and fully functionality of NAT traversal, it should be IP Security Protected. P...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008