LHIP – Lightweight Authentication for the Host Identity Protocol

نویسندگان

  • Miika Komu
  • Sasu Tarkoma
چکیده

The ubiquity of truly mobile appliances such as Wi-Fi-enabled mobile phones, PDAs, and Internet web pads stands in stark contrast to the lack of mobility support in today’s communication protocols. Many of these devices are multihomed and use standard protocols like IP and TCP, which have been designed for non-mobile computers with a single network device. Therefore, they are not able to cope with mobility and multihoming appropriately. Several protocols and protocol extensions have been proposed in order to add mobility support to TCP/IP. One of the most promising among them is the Host Identity Protocol (HIP) which adds an additional protocol layer between TCP and IP to hide host mobility from the transport layer. Apart from mobility and multihoming support, HIP also supports host authentication, payload encryption, and a cryptographic namespace without requiring changes to the network infrastructure or network applications. Especially mobile devices with few CPU resources are slowed down by HIP. The poor performance of HIP on these mobile devices results from the extensive use of public-key cryptography for securing the main HIP protocol functions. These public key operations are complex and CPU intensive. In this thesis, we present Lightweight HIP (LHIP), a HIP protocol extension which enables HIP to offer mobility and multihoming support without the use of public key cryptography. The goal of LHIP is to speed up HIP in order to make it usable for weak mobile devices.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

ارائه طرح احراز اصالت سبک با قابلیت گمنامی و اعتماد در اینترنت اشیا

The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases,   the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...

متن کامل

A lightweight identity authentication protocol for vehicular networks

Vehicle handover from one road-side unit to another is a common phenomenon in vehicular ad-hoc networks (VANETs). Authenticating vehicles effectively is the key to success of VANETs. Recently, Li and Liu proposed a lightweight identity authentication protocol for VANETs, which was claimed to integrate efficiency and security. However, in this paper, we show that their protocol is vulnerable to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007