Mobile ip registration in certificateless public key infrastructure
نویسندگان
چکیده
A secure and efficient mobile IP (MIP) registration protocol using certificateless signature scheme is proposed. The protocol minimises the registration time through minimal usage of an efficient certificateless signature scheme between a foreign agent (FA) and a home agent (HA). Protocol parameters can be kept resynchronised by reusing the initial values in the MIP registration in case the synchronisation between a mobile node (MN) and HA is lost. User anonymity is achieved via a temporary identity transmitted by a mobile user, instead of its true identity. Additional replay protection from the FA is included in the registration messages to prevent a possible replay attack. Numerical results and performance analyses demonstrate that the proposed protocol outperforms the existing ones in terms of the registration time, registration signalling traffic and computational load on an MN while providing improved security. For example, the proposed protocol reduces the registration time up to 83% compared with the protocol from Yang.
منابع مشابه
Improving Security and Efficiency in Mobile IP Networks
The emergence of mobile devices or mobile nodes allows the users to access the network when they are on the move. As users move frequently from one network to another network a new IP address is assigned to the mobile node every time when it visits a new network. The change in IP address is informed to other nodes is dealt by Mobile IP.The ID based protocol minimizes the registration delay thro...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملCertificateless Public Key cryptosystems For Mobile Ad hoc Networks
Due to importance of security in many critical applications in Mobile Adhoc Networks (MANETs) and the limitation of the resources in mobile devices, it is important to have secure lightweight cryptosystem. The easier key management and less overhead of transmitting processes make Public Key Cryptosystems (PKC) suitable for MANETs. Obviously, the main issue regarding to the use of PKC is to ensu...
متن کاملA Secure Mobile Banking Scheme Based on Certificateless Cryptography in the Standard Security Model
Providing the security services (authenticity, integrity, confidentiality and non-repudiation) all together in mobile banking has remained a problematic issue for both banks and their customers. Both the public key infrastructure (PKI) and the identity-based public key cryptography (IB-PKC) which have been thought to provide solutions to these security services, have their own limitations. Whil...
متن کاملComplex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IET Information Security
دوره 1 شماره
صفحات -
تاریخ انتشار 2007