Collision probability of one-to-many reversible mapping for IPV6 address generation
The paper presents results of collision probability evaluation of a one-to-many reversible mapping between user space and IPv6 address space which is developed to improve of IPv6 addresses generation in a local area network (LAN). Each time a user accesses the network, a dynamic unicast IPv6 addre...
| Main Authors: | Nashrul Hakiem, Nashrul Hakiem, Siddiqi, Mohammad Umar, Jarot, Sigit Puspito Wigati |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/28315/ http://irep.iium.edu.my/28315/1/ICCCE_2012_-_Nashrul_-_pp_599_-_602.pdf |
Similar Items
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012)
by: Hakiem, Nashrul, et al.
Published: (2012)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
by: Hakiem, Nashrul, et al.
Published: (2015)
by: Hakiem, Nashrul, et al.
Published: (2015)
One-to-many reversible mapping for IPv6 address management
by: Priantoro, Akhmal Unggul, et al.
Published: (2010)
by: Priantoro, Akhmal Unggul, et al.
Published: (2010)
Study on security of IPv6 address management in enterprise WLAN
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
by: Jarot, Sigit Puspito Wigati, et al.
Published: (2012)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Zigzag codes: high rate low complexity iterative codes
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Convolutional coded OFDM in broadband mobile communication
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Securing OFDM-based systems from the physical layer
by: Jarot, Sigit Puspito Wigati
Published: (2011)
by: Jarot, Sigit Puspito Wigati
Published: (2011)
Implementation of IPv6 address generation mechanism for enterprise wireless local area network in open source DHCPv6
by: Hakiem, Nashrul, et al.
Published: (2010)
by: Hakiem, Nashrul, et al.
Published: (2010)
Recent approaches to wireless physical layer security
by: -, M.Tahir, et al.
Published: (2011)
by: -, M.Tahir, et al.
Published: (2011)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Simulation of artificial noise based physical layer security
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)
by: Zurkiple, Muhammad Izzat, et al.
Published: (2011)
Analysis of p2p communication over various mobile platforms
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2013)
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2013)
Impulsive noise effects on DWT-OFDM versus FFT-OFDM
by: Abdullah, Khaizuran, et al.
Published: (2011)
by: Abdullah, Khaizuran, et al.
Published: (2011)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
Big data, cloud and "bring your own device": how the data protection law addresses the impact of 'datafication'
by: Zulhuda, Sonny, et al.
Published: (2015)
by: Zulhuda, Sonny, et al.
Published: (2015)
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
by: Qadir , Sana, et al.
Published: (2012)
by: Qadir , Sana, et al.
Published: (2012)
Future Internet Addressing (FI Address)
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Intelligent decision support system for degree selection using AHP technique
by: Jamil, Rokiah, et al.
Published: (2012)
by: Jamil, Rokiah, et al.
Published: (2012)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
Design of robust protocol to enhance QoS in mobile IPV6 environment
by: Hussien, Loay F., et al.
Published: (2010)
by: Hussien, Loay F., et al.
Published: (2010)
Macro/micro-mobility fast handover in hierarchical mobile IPv6
by: Habaebi, Mohamed Hadi
Published: (2006)
by: Habaebi, Mohamed Hadi
Published: (2006)
Service recovery of multicast hierarchical mobile IPV6 with context transfer
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
A new multicast-based architecture to support host mobility in IPv6
by: M. Ali, Borhanuddin, et al.
Published: (2003)
by: M. Ali, Borhanuddin, et al.
Published: (2003)
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
by: Vivaldi, Indra, et al.
Published: (2003)
by: Vivaldi, Indra, et al.
Published: (2003)
Routing scheme for macro mobility handover in hierarchical
mobile IPv6 network
by: Vivaldi, Indra, et al.
Published: (2003)
by: Vivaldi, Indra, et al.
Published: (2003)
Lightweight handover control function (L-HCF) for Mobile Internet Protocol version Six (IPv6)
by: Mokhtar, Rania A., et al.
Published: (2014)
by: Mokhtar, Rania A., et al.
Published: (2014)
Comprehensive QoS analysis of MIPL based mobile IPv6 using single VS. dual interfaces
by: Uddin, Mohammad Moshee, et al.
Published: (2011)
by: Uddin, Mohammad Moshee, et al.
Published: (2011)
An integrated scheme to improve performance of fast mobile IPv6 handover in IEEE 802.16e network
by: Seyyedoshohadaei, Seyyed Masoud, et al.
Published: (2009)
by: Seyyedoshohadaei, Seyyed Masoud, et al.
Published: (2009)
Fuzzy logic based handoff latency reduction mechanism in layer 2 of heterogeneous mobile IPv6 networks
by: Anwar, Farhat, et al.
Published: (2013)
by: Anwar, Farhat, et al.
Published: (2013)
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
by: Udaya, Paramapalli, et al.
Published: (1998)
by: Udaya, Paramapalli, et al.
Published: (1998)
Optimal biphase sequences with large linear complexity derived from sequences over Z4
by: Udaya, Paramapalli, et al.
Published: (1996)
by: Udaya, Paramapalli, et al.
Published: (1996)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
Similar Items
-
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014) -
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013) -
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011) -
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012) -
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)