A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
It is well known that the existing weak mechanism for authenticating binding update messages is one of the biggest security weaknesses in MIPv6. The best candidate to replace this weak mechanism is CGA signatures. CGA signatures require generating a digital signature of a binding update message. It...
| Main Authors: | Qadir , Sana, Siddiqi, Mohammad Umar, Anwar, Farhat |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
IEEE
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/27771/ http://irep.iium.edu.my/27771/1/A_study_of_CGA-_ICCCE_2012.pdf |
Similar Items
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
Evaluation of MIPv6 approach to provide multicast to mobile nodes
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)
Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
Deployment challenges of MIPV6
by: Masud, Mosharrof Hussain, et al.
Published: (2011)
by: Masud, Mosharrof Hussain, et al.
Published: (2011)
Implementation and integration of HF messaging system with cryptographic features
by: Mat Sidek, Abd. Rahim
Published: (2006)
by: Mat Sidek, Abd. Rahim
Published: (2006)
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Methods For Generating Cryptographic Keys From Online Hand Signatures
by: Yip, Wai Kuan
Published: (2007)
by: Yip, Wai Kuan
Published: (2007)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Improving message delay, handoff latency and binding update in high level nested network mobility
by: Babiker, Mohammed Ali, et al.
Published: (2015)
by: Babiker, Mohammed Ali, et al.
Published: (2015)
Analysis of handoff latency factors for MIPV6 network
by: Masud, Masharrof Hussain, et al.
Published: (2011)
by: Masud, Masharrof Hussain, et al.
Published: (2011)
MIPV6 extensions
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
Evidential analysis for computer generated animation (CGA)
by: Hussin, Norriza
Published: (2006)
by: Hussin, Norriza
Published: (2006)
A parallel duplicate address detection (PDAD) mechanism to reduce handoff latency of mobile internet protocol version 6 (MIPV6)
by: Masud, M. H., et al.
Published: (2011)
by: Masud, M. H., et al.
Published: (2011)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Cryptographic boolean functions: transform domain perspective
by: Mohamed Rafiq, Hashum, et al.
Published: (2011)
by: Mohamed Rafiq, Hashum, et al.
Published: (2011)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Updates on Contemporary Protein Binding Techniques
by: Chuang, Victor, et al.
Published: (2009)
by: Chuang, Victor, et al.
Published: (2009)
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Simulation evaluation of DiffServ approach integrated in MIPv6 networks
by: Hussien, Loay F., et al.
Published: (2011)
by: Hussien, Loay F., et al.
Published: (2011)
Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
MIPV6 based approaches for mobility management
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Efficient prefix updates for IP router using lexicographic ordering and updateable address set
by: Soh, Sieteng, et al.
Published: (2008)
by: Soh, Sieteng, et al.
Published: (2008)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
Cryptographic Authentication-Based Mechanism For Securing Secs/Gem Communications For Industry 4.0 Manufacturing
by: Laghari, Shams Ul Arfeen
Published: (2023)
by: Laghari, Shams Ul Arfeen
Published: (2023)
Offline Handwritten Signature Watermark for Digital Document Authentication
by: Low, Cheng Yaw
Published: (2008)
by: Low, Cheng Yaw
Published: (2008)
Offline Handwritten Signature Watermark For Digital Document Authentication
by: Yaw, Low Cheng
Published: (2008)
by: Yaw, Low Cheng
Published: (2008)
Enhancement of handoff latency reduction mechanism of Mobile Internet Protocol Version 6 (MIPv6)
by: Masud, M. H., et al.
Published: (2012)
by: Masud, M. H., et al.
Published: (2012)
An enhanced scheme to support QoS in MIPv6 based networks using DiffServ
by: Ibrahim, Loay, et al.
Published: (2011)
by: Ibrahim, Loay, et al.
Published: (2011)
EMS decoding algorithm that introduced shuffled strategy and improved variable node update
by: Cao, Xiawei, et al.
Published: (2022)
by: Cao, Xiawei, et al.
Published: (2022)
Does Comprehensive Geriatric Assessment (CGA) have a role in UK care homes?
by: Gordon, Adam L.
Published: (2012)
by: Gordon, Adam L.
Published: (2012)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
ASP authentication using IP address / Kumar Mallanaidu
by: Kumar , Mallanaidu
Published: (2003)
by: Kumar , Mallanaidu
Published: (2003)
Authenticity and Diversity: Enhancing Australian Hepatitis C Prevention Messages
by: Winter, R., et al.
Published: (2013)
by: Winter, R., et al.
Published: (2013)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Similar Items
-
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014) -
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014) -
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015) -
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011) -
Evaluation of MIPv6 approach to provide multicast to mobile nodes
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2014)