Abstract
AbstractFor the efficient communications between mobile or fixed hosts in mobile networks, the route optimization and its security are indispensable. So, the Internet Engineering Task Force introduced a NEMO basic support protocol in 2005. However, this protocol does not provide a strong security between hosts and especially in nested‐mobile network it can incur a pinball routing problem. And the previous Proxy Binding Update (PUB) protocol has an advantage that can prove the ownership of address of a host using Multi‐key Cryptographically Generated Address (MCGA) which can alleviate a neighbor bombing attack. However, a Mobile Network Node (MNN) belonging to the mobile network which can have low power or limited computing capability may be require burdened costs such as signification and verification of messages. Also, the PUB protocol does not provide the secure message communication architecture between the MNN and its Mobile Router (MR). In this paper we propose a CGA‐based Authentication Route Optimization scheme (CARO) in mobile hotspots with heterogeneous networks. The proposed CARO protocol satisfies two problems using IPsec Encapsulating Security Payload (ESP) tunnel, a secret mobile group key, and the CGA. And we also do not require the considerable computing costs to the MNN or a Correspondent Node. In performance analysis, we prove more secure and efficient protocols than the previous protocols using the defense of various attacks and the result of computational cost, etc. Copyright © 2010 John Wiley & Sons, Ltd.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.