The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on...
In this paper, we propose a Seamless and Secure service Framework (SSF) which guarantees secure association between user's terminal and safety critical system such as payment gateway by exploiting both user information and network information. Despite the leaks of personal sensitive information, SSF provides very safe service environment in wired and wireless convergence network that vertical handover...
Covering NEtwork MObility (NEMO) scenarios based on end-to-end mobility management protocols such as the Host Identity Protocol (HIP) is not straightforward. However, it has been demonstrated that HIP based NEMO solutions outperform NEMO Basic Support (NEMO BS), hence, HIP is being considered also for addressing NEMO scenario necessities. In this work we focus on the Registration Extension process...
Host Identity Protocol (HIP) has security support to enable secured mobility and multihoming, both of which are essential for future Internet applications. Yet micro-mobility has not been efficiently and securely addressed by HIP and other mechanisms based on it. This paper introduces a method based on HIP to support micro-mobility in an efficient and secure manner. We present the architectural elements...
While significant research effort has been dedicated to wireless localization over the past decades, most aspects of location security have been overlooked. In particular, adversaries can take advantage of security vulnerabilities of current location systems to launch location spoofing attacks, thus disguising their position in the network. In this paper, we address issues associated with location...
One important factor complicating security in Wireless Sensor Networks (WSNs) is lack of inexpensive tamper-resistant hardware in commodity sensors. Once an adversary compromises a sensor, all memory and forms of storage become exposed, along with all secrets. Thereafter, any cryptographic remedy ceases to be effective. Regaining sensor security after compromise (i.e., intrusion-resilience) is a formidable...
The importance of mobility in networks is being increased together with its number of users and applications. However, we still do not have broadly accepted solutions for mobility in Internet or other type of networks. In particular, mobility is difficult in heterogeneous networks, where heterogeneity could expand over ownership, administration, technology, and so on. We propose for such heterogeneous...
The growing demand for ubiquitous computing lead manufactures to develop multi-band devices supporting different network access technologies, such as GSM, Wi-fi, and UMTS. Although these devices support different access technologies, they lack of native vertical handover support, breaking any ongoing connections whenever users switch between access technologies. In this paper we present a next-generation...
Group key management scheme for mobile ad-hoc network is a research hotspot. A group key management architecture for a heterogeneous MANET model with UAV-aid and its detailed re-key methods are offered in this paper. At last, the performance analysis result of the architecture is also offered. The overload values of key storage and re-key computing show our scheme suits for heterogeneous mobile ad-hoc...
Mesh technology has captured the interest of university research and industry, because of its capacity to meet at the same time the requirements of suppliers of wireless access to Internet and of users. But, the architecture and the configuration of this type of network do not ensure a protection against the unauthorized use of the network since the basic security measures used do not include the...
Recently, Lee et al. proposed a delegation-based authentication protocol which provides secure and private roaming service for portable communication systems in global mobility networks. In this paper, we show that 1) Lee et al.'s protocol cannot protect users' privacy even though the protocol provides the user identity privacy; and 2) the unlinkability is required for delegation-based authentication...
Proxy mobile IPV6 protocol is a network-based mobility management protocol. Mobile node does not need to participate in any PMIPv6 messages. A certificated-based authentication mechanism based on the public key infrastructure is proposed in this article. It can be used to protect and authenticate two proxy binding messages of PMIPv6. In addition, we use SVO formal logic to analysis the security of...
Fast handover management in mobile IPv6 environments has been a research subject for a long time. Exploiting the cooperative diversity paradigm in partner-based hierarchical MIPv6 (PHMIPv6) promises an acceleration of the handoff management operation by relaying some signaling over a selected partner node prior to the actual handover to the new access point. For this purpose, a suitable partner node,...
This paper presents the results obtained in the development of a security mechanism for Web access control based on IEEE 802.11 mobile stations indoor location. The goal of the mechanism is to permit the control of the Web access made by students in an academic environment according to the classroom they are in. The access is controlled by a location server, which dynamically interacts with security...
Together with the IMO's future navigation system implementation strategy, the e-navigation, wireless access technologies are proliferating on the maritime scenario, covering last mile communications. In the near future, we foresee that communication technologies will coexist and will be available in overlapping areas through the maritime last mile. Therefore, in order to enhace ship-shore communications,...
The Fast Handovers for Mobile IPv6 (FMIPv6) protocol was developed from the experience of MIPv6 and the facilities provided by link layer triggers, allowing for a proactive approach to handover that minimises packet exchange delay and packet loss. After handover, the mobile node may carry out Return Routability with the correspondent node(s) for route optimization. However, this method leaves scope...
In PMIPv6, We propose a new Route Optimization (RO) scheme with roaming among the inter-domains. Previous works are used direct packet forwarding methods among the Mobile Access Gateways (MAGs) because the MAG manages the signaling for the mobile nodes (MNs) to support the mobility. However, previous works cause a lot of problems in security, packet delivery latency, and increasing the control messages...
Efficient, seamless and secure handover for mobile nodes in overlay heterogeneous networks is a main goal of mobility management. Mobility management can be classified into macro-mobility and micro-mobility management. The former handles the movement of a node between any two IP addresses and the later focuses on the handover between different access points within a single domain. Host Identity Protocol...
A distributed security MIPv6 model based on dynamic policies is presented to solve the security compatible problem between MIPv6 nodes and the access network. We combine the distributed defensive structure and MIPv6 to build a distributed secure MIPv6 structure based on policies, and implement the dynamic transference of secure policies during mobile nodespsila movement, thus to make the model has...
In this paper, we propose a location-release signature scheme based on bilinear pairings for vehicular ad hoc networks (VANETs). Location-release signature is a capsule signature signed by a source location server that becomes valid after the signature arrives at a specific destination location, where a location server publishes some trapdoor information associated with such a destination location...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.