Weak Context Establishment Procedure for Mobility and Multi-Homing Management

نویسندگان

  • Vesa Torvinen
  • Jukka Ylitalo
چکیده

Trust establishment seems to be the most difficult problem in mobility and multi-homing management. Many protocol proposals assume the presence of some security infrastructure (e.g. a Public-Key Infrastructure). However, building such a global infrastructure has not taken place, maybe because it would be too expensive and difficult to deploy. In this paper, we introduce a security context establishment procedure that utilizes reverse hash chains, and does not require pre-existing security information. The procedure is known to be vulnerable to an active Man-in-the-Middle attack in the first message exchange, however, the procedure is efficient, and does not have inherent scalability problems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-hop Multi-path Cooperative Connectivity Guided by Mobility, Throughput, and Energy Awareness: a Middleware Approach

The widespread diffusion of portable devices with multiple wireless interfaces, e.g., UMTS/GPRS, IEEE 802.11, and/or Bluetooth, is enabling multi-homing and multi-channel scenarios, possibly made up by multi-hop cooperative paths towards the traditional Internet. We claim that there is the need for novel middleware, aware of innovative context information, to select and dynamically re-configure...

متن کامل

Context-Aware Middleware for Reliable Multi-hop Multi-path Connectivity

The widespread diffusion of portable devices with multiple wireless interfaces, e.g., UMTS/GPRS, IEEE 802.11, and/or Bluetooth, is enabling multi-homing and multi-channel scenarios, possibly made up by multi-hop cooperative paths towards the traditional Internet infrastructure. There is the need for novel middleware supports, aware of innovative context information, to select and dynamically re...

متن کامل

The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

متن کامل

A Comparative Study on Different Pharmaceutical Industries and Proposing a Model for the Context of Iran

Medication is known as the main and the most effective factor in improving public health. On the other hand, having a strong and effective pharmaceutical industry will, to a very large extent, guarantee people's health. Therefore, this study was prospected to review the different pharmaceutical industries around the world and propose a model for the context of Iran. This is a qualitative as wel...

متن کامل

A Comparative Study on Different Pharmaceutical Industries and Proposing a Model for the Context of Iran

Medication is known as the main and the most effective factor in improving public health. On the other hand, having a strong and effective pharmaceutical industry will, to a very large extent, guarantee people's health. Therefore, this study was prospected to review the different pharmaceutical industries around the world and propose a model for the context of Iran. This is a qualitative as wel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004