IKE in ad-hoc IP networking

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As the Internet Protocol (IP) is becoming the ubiquitous networking protocol, the benefits of using IP-based security technology in different networking environments become clear. IPsec is already widely exploited in different networks and terminals. It is therefore expected that also IKEv2 will be required to adapt itself to a wide range of requirements posed by different key management environments. The problem studied in this paper is, how IKEv2 could be adapted for use in IP-based ad hoc networking. As a standard authentication and key agreement method IKEv2 would be available over different radio technologies, support secure IP networking and offer solid basis for multiple applications. We conclude that the problem can be solved and demonstrate it by presenting two different protocols, which integrate ad hoc authentication methods to standard IKEv2 exchanges. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Nyberg, K. (2005). IKE in ad-hoc IP networking. In Lecture Notes in Computer Science (Vol. 3313, pp. 139–151). Springer Verlag. https://doi.org/10.1007/978-3-540-30496-8_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free