tailieunhanh - Wireless Network Security phần 10

Trong phần 2, chúng tôi cung cấp thông tin cơ bản về tiêu chuẩn IEEE 802,21. Trong phần 3, chúng ta định nghĩa các mô hình an toàn giao thông MIH. Trong phần 4, các phương pháp khả thi cho giao thông vận tải MIH và an toàn với các giải pháp hiện có như được phân tích. | 2 EURASIP Journal on Wireless Communications and Networking MN CN HA Figure 1 Illustration of secure routing optimization in MIPv6. There are six messages in total. The MN-HA path is securely protected by the IPsec tunnel. 2. Route Optimization in Mobile IPv6 MIPv6 The secure RO in the MIPv6 is composed of six messages and is shown in Figure 1. The first four messages are dedicated to checking the RR of the CoA and the last two messages are used to authenticate the BU message. The MN sends the Home Test Init HoTI and the Care-of Test Init CoTI messages to initiate the binding update that is updating the new CoA at the CN. These two messages are sent almost simultaneously but along different paths the CoTI is sent directly to the CN and the HoTI is sent indirectly via the HA 1 are the HoTI and CoTI messages respectively HoTI HoA CN Rh 1 CoTI CoA CN Rc message at the CN and to examine a return path from the CN to the claimed CoA to determine if the address is routable. These two special routines are called Binding Update BU and Return Routability RR respectively and we refer to this series of activities as a secure RO in order to emphasize the security aspect in this RO. In this paper we address the problem of securing the routing optimization. This is a particularly difficult problem because of the following reasons. First we cannot expect a pre-established secure channel between communicating nodes nor an infrastructure to support secure transactions on behalf of communicating nodes 3 . In addition the new protocol should be efficient in yielding real-time responsiveness and have a light computational load because delay in the handover greatly affects the quality of service QoS in mobile applications. Last but not least the proposed protocol must be compatible with the legacy protocol to permit a smooth transition. Our goal in this paper is to take significant steps toward a system that fulfills these criteria. In our protocol the MN creates a secret and sends this

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.