677 research outputs found
On the security of the Mobile IP protocol family
The Internet Engineering Task Force (IETF) has worked on\ud
network layer mobility for more than 10 years and a number\ud
of RFCs are available by now. Although the IETF mobility\ud
protocols are not present in the Internet infrastructure as of\ud
today, deployment seems to be imminent since a number\ud
of organizations, including 3GPP, 3GPP2 and Wimax, have\ud
realized the need to incorporate these protocols into their architectures.\ud
Deployment scenarios reach from mobility support\ud
within the network of a single provider to mobility support\ud
between different providers and technologies. Current Wimax\ud
specifications, for example, already support Mobile IPv4,\ud
Proxy Mobile IPv4 and Mobile IPv6. Future specifications will\ud
also support Proxy Mobile IPv6. Upcoming specifications in\ud
the 3GPP Evolved Packet Core (EPC) will include the use of\ud
Mobile IPv4, Dual Stack MIPv6 and Proxy Mobile IPv6 for\ud
interworking between 3GPP and non 3GPP networks.\ud
This paper provides an overview on the state-of-the-art\ud
in IETF mobility protocols as they are being considered by\ud
standardization organizations outside the IETF and focusing\ud
on security aspects
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
We present an overview of quantum key distribution (QKD), a secure key
exchange method based on the quantum laws of physics rather than computational
complexity. We also provide an overview of the two most widely used commodity
security protocols, IPsec and TLS. Pursuing a key exchange model, we propose
how QKD could be integrated into these security applications. For such a QKD
integration we propose a support layer that provides a set of common QKD
services between the QKD protocol and the security applicationsComment: 12Page
Enhancing IPsec Performance in Mobile IPv6 Using Elliptic Curve Cryptography
Internet has become indispensable to the modern society nowadays. Due to the dynamic nature of human activities, the evolving mobile technology has played a significant role and it is reflected in the exponential growth of the number of mobile users globally. However, the characteristic of the Internet as an open network made it vulnerable to various malicious activities. To secure communication at network layer, IETF recommended IPsec as a security feature. Mobile IPv6 as the successor of the current mobile technology, Mobile IPv4, also mandated the use of IPsec. However, since IPsec is a set of security algorithm, it has several well-known weaknesses such as bootstrapping issue when generating a security association as well as complex key exchange mechanism. It is a well-known fact that IPsec has a high overhead especially when implemented on Mobile IPv6 and used on limited energy devices such as mobile devices. This paper aims to enhance the IPsec performance by substituting the existing key exchange algorithm with a lightweight elliptic curve algorithm. The experiments managed to reduce the delay of IPsec in Mobile IPv6 by 67% less than the standard implementation
Internet Engineering Task Force (IETF)
Abstract This document considers a VPN end user establishing an IPsec Security Association (SA) with a Security Gateway using the Internet Key Exchange Protocol version 2 (IKEv2), where at least one of the peers has multiple interfaces or where Security Gateway is a cluster with each node having its own IP address
Deploying ITS Scenarios Providing Security and Mobility Services Based on IEEE 802.11p Technology
Botany & plant science
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties
International audienceThere exist several automatic verification tools of cryptographic protocols, but only few of them are able to check protocols in presence of algebraic properties. Most of these tools are dealing either with Exclusive-Or (XOR) and exponentiation properties, so-called Diffie-Hellman (DH). In the last few years, the number of these tools increased and some existing tools have been updated. Our aim is to compare their performances by analysing a selection of cryptographic protocols using XOR and DH. We compare execution time and memory consumption for different versions of the following tools OFMC, CL-Atse, Scyther, Tamarin, TA4SP, and extensions of ProVerif (XOR-ProVerif and DH-ProVerif). Our evaluation shows that in most of the cases the new versions of the tools are faster but consume more memory. We also show how the new tools: Tamarin, Scyther and TA4SP, can be compared to previous ones. We also discover and understand for the protocol IKEv2-DS a difference of modelling by the authors of different tools, which leads to different security results. Finally, for Exclusive-Or and Diffie-Hellman properties, we construct two families of protocols P xori and P dhi that allow us to clearly see for the first time the impact of the number of operators and variables in the tools' performances
- …