{"title":"移动主机安全分布式位置管理方案","authors":"R. Shankaran, V. Varadharajan, M. Hitchens","doi":"10.1109/LCN.2001.990799","DOIUrl":null,"url":null,"abstract":"With the increasing growth in mobile computing devices and wireless networks, users are able to access information from anywhere and at anytime. In such situations, the issues of location management for mobile hosts are becoming increasingly significant. Different location management schemes such as Columbia University's mobile IP scheme and IETF Mobile IP have been proposed. In this paper, we propose a distributed location management scheme and discuss the advantages of the proposed scheme over the others. It seems that the proposed scheme is easy to implement and achieves optimal routing. The paper then considers the issues of multicasting in the proposed scheme. Finally, the paper describes security protocols for authentication and data privacy for the proposed architecture.","PeriodicalId":213526,"journal":{"name":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","volume":"3 9","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Secure distributed location management scheme for mobile hosts\",\"authors\":\"R. Shankaran, V. Varadharajan, M. Hitchens\",\"doi\":\"10.1109/LCN.2001.990799\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the increasing growth in mobile computing devices and wireless networks, users are able to access information from anywhere and at anytime. In such situations, the issues of location management for mobile hosts are becoming increasingly significant. Different location management schemes such as Columbia University's mobile IP scheme and IETF Mobile IP have been proposed. In this paper, we propose a distributed location management scheme and discuss the advantages of the proposed scheme over the others. It seems that the proposed scheme is easy to implement and achieves optimal routing. The paper then considers the issues of multicasting in the proposed scheme. Finally, the paper describes security protocols for authentication and data privacy for the proposed architecture.\",\"PeriodicalId\":213526,\"journal\":{\"name\":\"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks\",\"volume\":\"3 9\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2001-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCN.2001.990799\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.2001.990799","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure distributed location management scheme for mobile hosts
With the increasing growth in mobile computing devices and wireless networks, users are able to access information from anywhere and at anytime. In such situations, the issues of location management for mobile hosts are becoming increasingly significant. Different location management schemes such as Columbia University's mobile IP scheme and IETF Mobile IP have been proposed. In this paper, we propose a distributed location management scheme and discuss the advantages of the proposed scheme over the others. It seems that the proposed scheme is easy to implement and achieves optimal routing. The paper then considers the issues of multicasting in the proposed scheme. Finally, the paper describes security protocols for authentication and data privacy for the proposed architecture.