Skip to main content

A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment

  • Conference paper
Book cover Computational Science and Its Applications – ICCSA 2005 (ICCSA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3480))

Included in the following conference series:

Abstract

Long an issue of interest, network mobility technology is now being realized with the foundation of the NEMO(Network Mobility) Working Group (WG) in the IETF. Security problems for NEMO become more important because one or several MR(Mobile Router)s manage the mobility of an entire network as well as the nested mobile networks, but current NEMO lacks the defense mechanism against these problems. Thus, in this paper, we propose a scalable and ubiquitous mutual authentication and key distribution mechanism without TTP(Trusted Third Party) for a NEMO environment, that uses the threshold secret sharing technique for enhancing scalability and availability, and provides the low-processing for requirement of frequent mutual authentication by mobility. We simulated and analyzed our mechanism together with another general authentication mechanism in the view of scalability and processing delay. Our experimental results show that our mechanism provides a scalable security support for a NEMO environment.

This research was partially supported by University IT Research Center(ITRC) Project and Brain Korea(BK) 21 Project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ernst, T.: Network Mobility Support Goals and Requirements. IETF Internet Draft: draft-ietf-nemo-requirements-01.txt (May 2003)

    Google Scholar 

  2. Jung, S., Zhao, F., Wu, F., Kim, H., Sohn, S.: Threat Analysis for NEMO. IETF Internet Draft: draft-jung-nemo-threat-analysis-02.txt (February 2004)

    Google Scholar 

  3. Ng, C.-W., Tanaka, T.: Usage Scenario and Requirements for AAA in Network Mobility Support. IETF Internet Draft: draft-ng-nemo-aaa-use-00.txt (October 2002)

    Google Scholar 

  4. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: IEEE ICNP (2001)

    Google Scholar 

  5. Luo, H., et al.: Self-securing Ad Hoc Wireless Networks. In: 7th IEEE Symposium on Computers and Communications (2002)

    Google Scholar 

  6. Guillermo, M., et al.: Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. In: Designs, Codes and Cryptography. Kluwer Academic Publishers, Dordrecht (2003)

    Google Scholar 

  7. Shieh, S.-P., Yang, W.-H., Sun, H.-M.: An Authentication Protocol Without Trusted Third Party. IEEE Communications Letters 1(3) (May 1997)

    Google Scholar 

  8. Salgarelli, L., et al.: Efficient Authentication and Key Distribution in Wireless IP Networks. IEEE Wireless Communications (December 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, M., Kim, E., Chae, K. (2005). A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424758_62

Download citation

  • DOI: https://doi.org/10.1007/11424758_62

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25860-5

  • Online ISBN: 978-3-540-32043-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics