Secure and scalable mobile IP registration scheme using PKI

Jae Pil Yoo, Keecheon Kim, Hyunseung Choo, Jae Il Lee, Joo Seok Song

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)

Abstract

Mobile IP gets its firm position as a layer-3 mobility protocol for the 3rd generation and beyond the 3rd generation communication system. Nevertheless, due to the security defects caused by adapting MIP for real service, several systems such as AAA infrastructure have been introduced. On the other hand, PKI infrastructure is considered to be a core standard infrastructure to handle the authentication and secure channel for the present and future network. In this paper, we suggest a secure registration scheme with authentication using PKI infrastructure. Suggested scheme produces less static key management overhead compared with legacy scheme and supports the previously deployed standard authentication infrastructure. Especially, it has a feature that supports mobile communication system. Secure re-distribution of dynamic session key using asymmetric key and the optimized authentication roundtrip time for handoffs shows such a feature.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsVipin Kumar, Vipin Kumar, Marina L. Gavrilova, Chih Jeng Kenneth Tan, Chih Jeng Kenneth Tan, Pierre L’Ecuyer
PublisherSpringer Verlag
Pages220-229
Number of pages10
ISBN (Print)354040161X
DOIs
Publication statusPublished - 2003

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2668
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Secure and scalable mobile IP registration scheme using PKI'. Together they form a unique fingerprint.

Cite this