Abstract
Long an issue of interest, network mobility technology is now being realized with the foundation of the NEMO(Network Mobility) Working Group (WG) in the IETF. Security problems for NEMO become more important because one or several MR(Mobile Router)s manage the mobility of an entire network as well as the nested mobile networks, but current NEMO lacks the defense mechanism against these problems. Thus, in this paper, we propose a scalable and ubiquitous mutual authentication and key distribution mechanism without TTP(Trusted Third Party) for a NEMO environment, that uses the threshold secret sharing technique for enhancing scalability and availability, and provides the low-processing for requirement of frequent mutual authentication by mobility. We simulated and analyzed our mechanism together with another general authentication mechanism in the view of scalability and processing delay. Our experimental results show that our mechanism provides a scalable security support for a NEMO environment.
This research was partially supported by University IT Research Center(ITRC) Project and Brain Korea(BK) 21 Project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ernst, T.: Network Mobility Support Goals and Requirements. IETF Internet Draft: draft-ietf-nemo-requirements-01.txt (May 2003)
Jung, S., Zhao, F., Wu, F., Kim, H., Sohn, S.: Threat Analysis for NEMO. IETF Internet Draft: draft-jung-nemo-threat-analysis-02.txt (February 2004)
Ng, C.-W., Tanaka, T.: Usage Scenario and Requirements for AAA in Network Mobility Support. IETF Internet Draft: draft-ng-nemo-aaa-use-00.txt (October 2002)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: IEEE ICNP (2001)
Luo, H., et al.: Self-securing Ad Hoc Wireless Networks. In: 7th IEEE Symposium on Computers and Communications (2002)
Guillermo, M., et al.: Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. In: Designs, Codes and Cryptography. Kluwer Academic Publishers, Dordrecht (2003)
Shieh, S.-P., Yang, W.-H., Sun, H.-M.: An Authentication Protocol Without Trusted Third Party. IEEE Communications Letters 1(3) (May 1997)
Salgarelli, L., et al.: Efficient Authentication and Key Distribution in Wireless IP Networks. IEEE Wireless Communications (December 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, M., Kim, E., Chae, K. (2005). A Scalable Mutual Authentication and Key Distribution Mechanism in a NEMO Environment. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3480. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424758_62
Download citation
DOI: https://doi.org/10.1007/11424758_62
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25860-5
Online ISBN: 978-3-540-32043-2
eBook Packages: Computer ScienceComputer Science (R0)