{"title":"异构网络中基于双线性配对的NEMO密钥管理安全方案","authors":"Vikram Raju R, U. Rawat, K. Garg","doi":"10.1145/3234698.3234738","DOIUrl":null,"url":null,"abstract":"Network Mobility (NEMO) is invented for providing internet to group of nodes (smart phones, ipad and laptop).It is inherited from Mobile IPv6. There are security threats inside the NEMO during handoff while exchanging Binding Updates (BU) between the Mobile Network Node (MNN), Correspondent Node (CN) and Home Agent (HA). It may prone to several malicious attacks also during the network address exchange between nodes inside the NEMO. A proper end-to-end security mechanism is required to protect the Binding Update and Binding Acknowledgement. We have proposed a security architecture to provide authentication and confidentiality at each and every level of communication (MNN ↔ HA, MR ↔ HA, MNN ↔ CN)using a 3-Party Key Exchange called (3-PKE-NEMO) with the help of Bilinear Pairing Theorem. This architecture also provides security to Route Optimization (RO). We have minimized handoff delay and shown results using the NS2 simulator without compromising the security. Our security architecture is found to be more efficient when compared with related existing solutions.","PeriodicalId":144334,"journal":{"name":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","volume":"146 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Bilinear Pairing Based Key Management Security Scheme to NEMO in Heterogeneous Networks\",\"authors\":\"Vikram Raju R, U. Rawat, K. Garg\",\"doi\":\"10.1145/3234698.3234738\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network Mobility (NEMO) is invented for providing internet to group of nodes (smart phones, ipad and laptop).It is inherited from Mobile IPv6. There are security threats inside the NEMO during handoff while exchanging Binding Updates (BU) between the Mobile Network Node (MNN), Correspondent Node (CN) and Home Agent (HA). It may prone to several malicious attacks also during the network address exchange between nodes inside the NEMO. A proper end-to-end security mechanism is required to protect the Binding Update and Binding Acknowledgement. We have proposed a security architecture to provide authentication and confidentiality at each and every level of communication (MNN ↔ HA, MR ↔ HA, MNN ↔ CN)using a 3-Party Key Exchange called (3-PKE-NEMO) with the help of Bilinear Pairing Theorem. This architecture also provides security to Route Optimization (RO). We have minimized handoff delay and shown results using the NS2 simulator without compromising the security. Our security architecture is found to be more efficient when compared with related existing solutions.\",\"PeriodicalId\":144334,\"journal\":{\"name\":\"Proceedings of the Fourth International Conference on Engineering & MIS 2018\",\"volume\":\"146 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Fourth International Conference on Engineering & MIS 2018\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3234698.3234738\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fourth International Conference on Engineering & MIS 2018","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3234698.3234738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Bilinear Pairing Based Key Management Security Scheme to NEMO in Heterogeneous Networks
Network Mobility (NEMO) is invented for providing internet to group of nodes (smart phones, ipad and laptop).It is inherited from Mobile IPv6. There are security threats inside the NEMO during handoff while exchanging Binding Updates (BU) between the Mobile Network Node (MNN), Correspondent Node (CN) and Home Agent (HA). It may prone to several malicious attacks also during the network address exchange between nodes inside the NEMO. A proper end-to-end security mechanism is required to protect the Binding Update and Binding Acknowledgement. We have proposed a security architecture to provide authentication and confidentiality at each and every level of communication (MNN ↔ HA, MR ↔ HA, MNN ↔ CN)using a 3-Party Key Exchange called (3-PKE-NEMO) with the help of Bilinear Pairing Theorem. This architecture also provides security to Route Optimization (RO). We have minimized handoff delay and shown results using the NS2 simulator without compromising the security. Our security architecture is found to be more efficient when compared with related existing solutions.