Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks  [PDF]
Maher Ben Jemaa,Nahla Abid,Maryline Laurent-Maknavicius,Hakima Chaouchi
Journal of Computer Networks and Communications , 2009, DOI: 10.1155/2009/383517
Abstract: The role of Internet Protocol (IP) is becoming more and more problematic especially with the new requirements of mobility and multihoming. Host Identity protocol (HIP) defines a new protocol between the network and transport layers in order to provide a better management to those requirements. The protocol defines a new namespace based on cryptographic identifiers which enable the IP address roles dissociation. Those new identifiers identify hosts rather than IP addresses. Because HIP is a quite recent protocol, we propose to present an experimental evaluation of its basic characteristics.
Inter-subnet localized mobility support for host identity protocol  [cached]
Muslam Muhana,Chan H Anthony,Ventura Neco
EURASIP Journal on Wireless Communications and Networking , 2011,
Abstract: Host identity protocol (HIP) has security support to enable secured mobility and multihoming, both of which are essential for future Internet applications. Compared to end host mobility and multihoming with HIP, existing HIP-based micro-mobility solutions have optimized handover performance by reducing location update delay. However, all these mobility solutions are client-based mobility solutions. We observe that another fundamental issue with end host mobility and multihoming extension for HIP and HIP-based micro-mobility solutions is that handover delay can be excessive unless the support for network-based micro-mobility is strengthened. In this study, we co-locate a new functional entity, subnet-rendezvous server, at the access routers to provide mobility to HIP host. We present the architectural elements of the framework and show through discussion and simulation results that our proposed scheme has achieved negligible handover latency and little packet loss.
A Study on Host Identity Protocol(HIP)

YU Shu-yao,ZHANG You-kun,

计算机应用研究 , 2005,
Abstract: This paper analyzes TCP/IP's shortcomings in solving mobility, multihoming, dynamic IP Readdressing, network security, NAT/NAPT problems, and introduces Host Identity Protocol(HIP) which is aimed at solving all these problems. The paper firstly introduces HIP's framework, then further analyzes its details in implementation, and further discusses how HIP can resolve these problems like mobility. Finally, the paper points out problems HIP should resolve before being widely deployed in today's TCP/IP.
Mobile and Multi-homing Solution Based on Host Identity Protocol

YU Shi-cai,LI Chang-xing,SONG Jian,SUN Wei,

计算机应用研究 , 2006,
Abstract: The Host Identity Protocol(HIP) introduces a new namespace,asymmetric cryptographic in nature,and protocol layer between internetworking layer and transport layer,breaking the fixed binding between identities and locations.Based on the study of HIP in this paper,the solutions to mobility in different cases are presented and compared with MIPv6 and the relationship between mobility and multi-homing is analyzed.
Fortification of Transport Layer Security Protocol with Hashed Fingerprint Identity Parameter
Kuljeet Kaur,G. Geetha
International Journal of Computer Science Issues , 2012,
Abstract: Identity over the public links becomes quiet complex as Client and Server needs proper access rights with authentication. For determining clients identity with password Secured Shell Protocol or Public Key Infrastructure is deployed by various organizations. For end to end transport security SSL (Secured Socket Layer) is the de facto standard having Record and Handshake protocol dealing with data integrity and data security respectively. It seems secure but many risks lurk in its use. So focus of the paper would be formulating the steps to be used for the enhancement of SSL. One more tier of security to the transport layer security protocol is added in this research paper by using fingerprints for identity authentication along with password for enhancement of SSL. Bio Hashing which will be done with the help of Minutiae Points at the fingerprints would be used for mutual authentication. New hash algorithm RNA-FINNT is generated in this research paper for converting minutiae points into hashed code. Value of hashed code would be stored at the Database in the Multi Server environment of an organization. Research paper will perform mutual authentication in the multi server environment of an organization with the use of fingerprint and password both as identity authentication parameters. This will strengthen record and handshake protocol which will enhance SSL and further enhancement of SSL will result in the fortification of Transport Layer Security Protocol.
An Empirical Analysis of Internet Protocol Version 6 (IPv6)  [PDF]
Ioan Raicu
Computer Science , 2004,
Abstract: Although the current Internet Protocol known as IPv4 has served its purpose for over 20 years, its days are numbered. With IPv6 reaching a mature enough level, there is a need to evaluate the performance benefits or drawbacks that the new IPv6 protocol will have in comparison to the well established IPv4 protocol. Theoretically, the overhead between the two different protocols should be directly proportional to the difference in the packet's header size, however according to our findings, the empirical performance difference between IPv4 and IPv6, especially when the transition mechanisms are taken into consideration, is much larger than anticipated. We first examine the performance of each protocol independently. We then examined two transition mechanisms which perform the encapsulation at various points in the network: host-to-host and router-to-router (tunneling). Our experiments were conducted using two dual stack (IPv4/IPv6) routers using end nodes running both Windows 2000 and Solaris 8.0 in order to compare two different IPv6 implementations side by side. Our tests were written in C++ and utilized metrics such as latency, throughput, CPU utilization, socket creation time, socket connection time, web server simulation, and a video client/server application for TCP/UDP in IPv4/IPv6 under both Windows 2000 and Solaris 8.0. Our empirical evaluation proved that IPv6 is not yet a mature enough technology and that it is still years away from having consistent and good enough implementations, as the performance of IPv6 in many cases proved to be significantly worse than IPv4.
Efficient Identity-Based and Authenticated Key Agreement Protocol  [PDF]
Yongge Wang
Computer Science , 2012,
Abstract: Several identity based and implicitly authenticated key agreement protocols have been proposed in recent years and none of them has achieved all required security properties. In this paper, we propose an efficient identity-based and authenticated key agreement protocol IDAK using Weil/Tate pairing. The security of IDAK is proved in Bellare-Rogaway model. Several required properties for key agreement protocols are not implied by the Bellare-Rogaway model. We proved these properties for IDAK separately.
A User Identity Management Protocol for Cloud Computing Paradigm  [PDF]
Safiriyu Eludiora, Olatunde Abiona, Ayodeji Oluwatope, Adeniran Oluwaranti, Clement Onime, Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2011, DOI: 10.4236/ijcns.2011.43019
Abstract: Cloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, we propose user identity management protocol for cloud computing customers and cloud service providers. This protocol will authenticate and authorize customers/providers in other to achieve global security networks. The protocol will be developed to achieve the set global security objectives in cloud computing environments. Confidentiality, integrity and availability are the key challenges of web services’ or utility providers. A layered protocol design is proposed for cloud computing systems, the physical, networks and application layer. However, each layer will integrate existing security features such as firewalls, NIDS, NIPS, Anti-DDOS and others to prevent security threats and attacks. System vulnerability is critical to the cloud computing facilities; the proposed protocol will address this as part of measures to secure data at all levels. The protocol will protect customers/cloud service providers’ infrastructure by preventing unauthorized users to gain access to the service/facility.
Sofiane Hamrioui,Mustapha Lalam
International Journal of New Computer Architectures and their Applications , 2011,
Abstract: In this paper, we propose an improvement to the transport protocol performance in Mobile Ad Hoc Network (MANET) by exploiting the backoff algorithm of Medium Access Control (MAC) protocol. We are especially interested in the TCP (Transmission Control Protocol) performance parameters like the throughput and end-to-end delay. This improvement is IB-MAC (Improvement of Backoff algorithm of MAC protocol) which proposes a new backoff algorithm based on a dynamic adaptation of its maximal limit according to the number of nodes and their mobility. The evaluation of our IB-MAC solution and the study of its incidences on TCP performance are done with AODV as like routing protocol, TCP New Reno as like transport protocol and varied network conditions such as load and mobility. The results are satisfactory and showed that our algorithm can outperform not only MAC standard, but also similar techniques that have been proposed in the literature like MAC-LDA and MAC-WCCP.
Dynamic Identity Based Authentication Protocol for Two-Server Architecture  [PDF]
Sandeep K. Sood
Journal of Information Security (JIS) , 2012, DOI: 10.4236/jis.2012.34040
Abstract: Most of the password based authentication protocols make use of the single authentication server for user's authentication. User's verifier information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. On the other hand, multi-server architecture based authentication protocols make it difficult for the attacker to find out any significant authentication information related to the legitimate users. In 2009, Liao and Wang proposed a dynamic identity based remote user authentication protocol for multi-server environment. However, we found that Liao and Wang's protocol is susceptible to malicious server attack and malicious user attack. This paper presents a novel dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned flaws, while keeping the merits of Liao and Wang's protocol. It uses two-server paradigm by imposing different levels of trust upon the two servers and the user's verifier information is distributed between these two servers known as the service provider server and the control server. The proposed protocol is practical and computational efficient because only nonce, one-way hash function and XOR operations are used in its implementation. It provides a secure method to change the user's password without the server's help. In e-commerce, the number of servers providing the services to the user is usually more than one and hence secure authentication protocols for multi-server environment are required.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.