Weak context establishment procedure for mobility and multihoming management

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Trust establishment seems to be the most difficult problem in mobility and multi-homing management. Many protocol proposals assume the presence of some security infrastructure (e.g. a Public-Key Infrastructure). However, building such a global infrastructure has not taken place, maybe because it would be too expensive and difficult to deploy. In this paper, we introduce a security context establishment procedure that utilizes reverse hash chains, and does not require pre-existing security information. The procedure is known to be vulnerable to an active Man-in-the-Middle attack in the first message exchange, however, the procedure is efficient, and does not have inherent scalability problems. © 2005 by International Federation for Information Processing.

Cite

CITATION STYLE

APA

Torvinen, V., & Ylitalo, J. (2005). Weak context establishment procedure for mobility and multihoming management. In IFIP Advances in Information and Communication Technology (Vol. 175, pp. 111–123). Springer New York LLC. https://doi.org/10.1007/0-387-24486-7_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free