2 research outputs found

    Enhancement of FMIPv6 by Utilising Concurent Binding Update Process

    Full text link
    The world is progressing toward the Mobile Internet Protocol Television (MIPTV) era where people are able to watch television while roaming. The MIPTV technology requires high bandwidth and low latency handover. This paper enhances the binding updates process in the Fast Handover Mobile IPv6 (FMIPv6) to improve its handover process performance in term of secureness and robustness, by implementing concurant binding update process thru the use of the International Mobile Subscriber Identifier (IMSI). Simulation results show that the proposed idea reduces the handover latency to about 63% compared to standard FMIPv6

    Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard

    Full text link
    In this paper we scrutinize the security properties of an RFID authentication protocol conforming to the EPC Class-1 Generation-2 standard. The protocol is suitable for Gen-2 passive tags and requires simple computations. The authors claim that the scheme provides privacy protection and authentication and offers resistant against commonly assumed attacks. We propose a de-synchronization and an impersonation attack in which the disclosing of the secret information (i.e. secret key and static identifier) shared between the tag and the reader is unnecessary to success in these attacks
    corecore