期刊文献+

HMIPv6的安全本地绑定更新

Security local binding updates in Hierarchical Mobile IPv6
下载PDF
导出
摘要 HMIPv6是MIPv6的扩展。本文提出一种使用基于身份的签名方案,对本地绑定更新进行认证。MN在MAP域内获得RCoA的同时获得基于RCoA身份的公私钥。MN使用基于RCoA生成的私钥签名,MAP使用相应的公钥进行验证,确保无仿冒的节点。并且MN在域内绑定更新和身份验证一次完成,密钥也是在初次进入域时获得,域内移动时MN保留公私钥,无需重新获取。本文提出的方法节省了MN在域内的切换时间,不影响MN与CN通信。 Hierarchical mobile IPv6 is designed to reduce the amount of between the Mobile Node, its Correspondent Nodes, and its Home Agent. Entering a MAP domain, the MN can bind its current location (LCoA) with an address on the MAP's subnet (RCoA). In our paper, an ID-based signature scheme is proposed to authenticate the ownership of the local binding updates. Using this method, local BU and authentication can be accomplished at one time, meanwhile, this method moderates the possibility of attacks from the fake nodes. Moving in one MAP domain, a mobile node holds the secret key without recovering.
机构地区 南京理工大学
出处 《微计算机信息》 2009年第9期72-74,共3页 Control & Automation
关键词 HMIPV6 本地绑定更新 基于身份的签名 安全 HMIPv6 Local binding updates ID-based security
  • 相关文献

参考文献5

二级参考文献46

  • 1张静,卢燕飞,冯玉珉.基于IP的3G网络间的无缝切换技术[J].微计算机信息,2006(01X):200-202. 被引量:2
  • 2[2]J.Arkko.RFC3776:Using IPsec to Protect Mobile IPv6 Signaling of MN and HA[s].2004-6.
  • 3[4]Perkins C,Bhagwat P.A Mobile Networking System Based on Internet Protocol.IEEE Personal Communications,1994,1(1):32-41
  • 4[1]D.Johnson.RFC3775:Mobility Support in IPv6[s].2004-6.
  • 5L C Guillou,J J Quisquater.A "paradoxical" identity-based signature scheme resulting from zero-knowledge[G].In:Advances in Cryptology-Crypto'88,LNCS 403.Berlin:Springer-Verlag,1990.216-231
  • 6U Fiege,A Fiat,A Shamir.Zero-knowledge proofs of identity[J].Journal of Cryptology,1998,1(2):77-94
  • 7C Cocks.An identity based encryption scheme based on quadratic residues[G].In:Proc of the IMA Int'l Conf on Cryptography and Coding,LNCS 2260.Berlin:Springer-Verlag,2001.360-363
  • 8D Boneh,M Franklin.Identity-based encryption from the Weil pairing[G].In:Advances in Cryptology-Crypto'01,LNCS 2139.Berlin:Springer-Verlag,2001.213-229
  • 9B Lynn.Authenticated ID-based encryption[R].Cryptology ePrint Archive,Tech Rep:2002/072,2004.http://eprint.iacr.org/ 2002/072
  • 10R Canetti,S Halevi,J Katz.Chosen-ciphertext security from identity based encryption[G].In:Advances in Cryptology-Eurocrypt'04,LNCS 3027.Berlin:Springer-Verlag,2004.207-222

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部