• Title/Summary/Keyword: mobile protocol

Search Result 1,962, Processing Time 0.029 seconds

A Trust Center Based Secure Mobile Agent Transfer Protocol (신뢰 센터 기반의 안전한 이동 에이전트 전송 프로토콜)

  • 한승완;임형석
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.993-996
    • /
    • 1999
  • A mobile agent is a program which is capable of migrating autonomously from host to host in the heterogeneous network, to perform some computation on behalf of the user. Mobile agents have many advantages in the distributed computing environment. But they are likely to suffer many attacks on the security due to the mobility. In order to make use of a mobile agent in the real applications, the security issues must be addressed. We deal with the problem which is concerned with protecting a mobile agent in transit and detecting a mobile agent clone. In this paper we propose a trust center based secure mobile agent transfer protocol. This protocol transfers a mobile agent securely from host to host and detects a mobile agent clone. We further show the security of the protocol against many attacks.

  • PDF

Public-Key Based Registration/Session-Key Distribution Protocol in AAA for Mobile IP (Mobile IP AAA에서의 등록과 세션키 분배 프로토콜)

  • 황재훈;송홍엽
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.3C
    • /
    • pp.220-225
    • /
    • 2002
  • Mobile IP aims to support mobility within the Internet. This paper concerned with the security aspect of Mobile IP. We show that current registration protocol has a possible replay attack despite the use of authenticated registration message and replay protection. We propose a public-key based registration protocol that also distributes a session-key distribution protocol in AAA. Proposed protocol provides authentication of mobile node and session-key distribution simultaneously. It also provides non-repudiation of service request.

Mobile Sink Supporting Routing Protocol using Agent of Cluster Node (클러스터 노드의 에이전트를 이용한 이동 싱크 지원 라우팅 프로토콜)

  • Kim, Young-Soo;Suh, Jung-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1208-1214
    • /
    • 2009
  • Sensor networks are vulnerable to data congestion and hot-spot compared with wireless networks. Mobile sink supporting route protocol has such problems as hot-spot and data congestion because agent of cluster node transmits all data packet. Therefore, mobile sink supporting route protocol needs to reduce the number of packets and keep the packets from concentrating on a single node. To solve these problems, we propose mobile sink supporting routing Protocol using agent of cluster node. Cutting down on the number of packets compared with the existing mobile sink supporting routing Protocol, our proposed protocol has reduced both communication overhead and energy consumption.

An Efficient Fault Tolerance Protocol with Backup Foreign Agents in a Hierarchical Local Registration Mobile IP

  • Hong, Choong-Seon;Yim, Ki-Woon;Lee, Dae-Young;Yun, Dong-Sik
    • ETRI Journal
    • /
    • v.24 no.1
    • /
    • pp.12-22
    • /
    • 2002
  • A Mobile IP allows IP hosts to move between different networks without changing their IP addresses. Mobile IP systems supporting local registration were introduced to reduce the number of times a home registration with the remotely located home agent was needed. The local registration Mobile IP scheme enhanced performance by processing registration requests of mobile nodes at a local agent. The local registration approach may affect other aspects of the Mobile IP systems such as fault tolerance. In this paper, we briefly review previous solutions for supporting fault tolerance in local registration Mobile IP systems and propose a fault tolerance protocol with a backup foreign agent in a hierarchical local registration mobile IP to enhance the efficiency of such systems against foreign agent failures. We also describe the specification of the proposed protocol using LOTOS and perform its validation using MiniLite. Finally, we analyze the performance of our proposed fault tolerance protocol through simulation.

  • PDF

A Study of method to apply MANET Protocol for Route Optimization in Nested Mobile Network (Nested Mobile Network상의 Route Optimization을 위한 MANET Protocol 적용 방안 연구)

  • Choi, Seung-Won;Kim, Sang-Bok;Kim, Young-Beom
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.269-272
    • /
    • 2005
  • 무선 네트워크 이동성 기술에 대한 연구가 수년간 진행되어 오면서 Mobile Network에 PAN(Personal Area Network)과 유사한 형태의 Nested Mobile Network에 대한 관심이 높아지고 있으며, 이러한 Nested Mobile Network에서의 경로최적화(Route Optimization : RO) 기술에 대한 연구가 활발하게 진행되고 있다. NEMO(NEtwork MObility)의 RO를 위해 제안된 논문 중에 ORC(Optimized Route Cache Protocol)에 대한 제안이 있었다.[1] NEMO Basic Support가 표준안으로 채택되면서 연구 대상에서 거론되지 않고 있지만, 복잡한 이동성 기술인 Nested Mobile Network상의 RO를 위해 다시 검토해 볼 수 있을 것이다. 또한 동일 저자에 의해 제안된 Nested Mobile Network 내부에 Ad-hoc Routing 알고리즘인 OLSR(Optimized Link State Routing Protocol)을 적용한 제안이 발표되었다.[2] 본 논문에서는 ORC와 Nested Mobile Network상의 OLSR Scheme을 적용하여 RO를 위한 방안을 제안하고자 한다.

  • PDF

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.

Multicast Routing Protocol for Guaranting Host Mobility (호스트 이동성 보장을 위한 멀티캐스트 라우팅 프로토콜)

  • 양승제;박성한
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.133-136
    • /
    • 2003
  • In this paper, we propose a multicast routing protocol for the seamless delivery of multicast data to mobile hosts through the optimal route in IP based mobile networks. The proposed multicast routing protocol is a hybrid method employing the merits of the bi-directional tunneling and the remote subscription by considering the mobility of mobile hosts. The proposed protocol satisfies the bound of end-to-end delay and supports the seamless handoff. The simulation results show that the proposed protocol has better performance in the number of multicast tree reconstruction and tunneling length and packet loss time than the previous protocols.

  • PDF

Network Architecture and Routing Protocol for Supporting Mobile IP in Mobile Ad Hoc Networks (이동 애드 혹 네트워크의 Mobile IP 지원을 위한 네트워크 구조 및 라우팅 프로토콜)

  • Oh, Hoon;TanPhan, Anh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1A
    • /
    • pp.24-35
    • /
    • 2008
  • We propose a tree-based integrated network of infrastructure network and mobile ad hoc network to effectively support Mobile IP for mobile ad hoc networks and also proposed a network management protocol for formation and management of the integrated network and a tree-based routing protocol suitable for the integrated network. The integrated network has fixed gateways(IGs) that connect two hybrid networks and the mobile nodes in the network form a small sized trees based on the mobile nodes that are in the communication distance with a IG. A new node joins an arbitrary tree and is registered with its HA and FA along tree path. In addition, the proposed protocol establishes a route efficiently by using the tree information managed in every node. We examined the effectiveness of the tree-based integrated network for some possible network deployment scenarios and compared our routing protocol against the Mobile IP supported AODV protocol.

Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications

  • He, Debiao
    • ETRI Journal
    • /
    • v.34 no.3
    • /
    • pp.482-484
    • /
    • 2012
  • With the rapid progress of wireless mobile communications, the authenticated key agreement (AKA) protocol has attracted an increasing amount of attention. However, due to the limitations of bandwidth and storage of the mobile devices, most of the existing AKA protocols are not suitable for wireless mobile communications. Recently, Lo and others presented an efficient AKA protocol based on elliptic curve cryptography and included their protocol in 3GPP2 specifications. However, in this letter, we point out that Lo and others' protocol is vulnerable to an offline password guessing attack. To resist the attack, we also propose an efficient countermeasure.

QoS guaranteed I-MRSVP Protocol for Supporting Integrated Mobility in Mobile Computing Environments (이동 컴퓨팅 환경에서 통합 이동성을 지원하는 QoS 보장형 I-MRSVP 프로토콜)

  • 박상윤;임동규;김원태;엄영익
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5B
    • /
    • pp.388-403
    • /
    • 2003
  • RSVP was published as a resource reservation protocol to guarantee QoS for realtime applications in wired network environments. As mobile application services in wireless network environments are more popular, QoS guaranteeing problem becomes an important issue in mobile computing environments. Therefore, the researches about cooperation between RSVP and Mobile IP supporting mobility in mobile computing environments are activating today. In this paper, we propose I-MRSVP(Integrated-Mobile RSVP), a QoS guaranteed resource reservation protocol supporting the integrated mobility in mobile computing environments. I-MRSVP protocol supports the integrated mobility providing interoperability between Mobile IP-based macro cells and Cellular IP-based micro cells. To minimize resource reservation overheads, it provides efficient resource reservation functions by using the signal strength based predictive resource reservation scheme.