Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chang, TY | en_US |
dc.contributor.author | Yang, CC | en_US |
dc.contributor.author | Chen, CM | en_US |
dc.date.accessioned | 2014-12-08T15:19:02Z | - |
dc.date.available | 2014-12-08T15:19:02Z | - |
dc.date.issued | 2005-06-01 | en_US |
dc.identifier.issn | 0916-8516 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1093/ietcom/e88-b.6.2557 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/13672 | - |
dc.description.abstract | Recently, the integration of wired and wireless networks has become an interesting issue. The introduction of extending Mobile IP to mobile ad hoc networks not only helps the mobile nodes connect to the Internet but also broadens the scope of the ad hoc networks and increases their application. However, these hybrid schemes faces several security problems from the inherent weakness of ad hoc routing. In this paper, we propose a hybrid authentication scheme of Mobile IP assistance for ad hoc routing security. The regular Mobile IP registration scheme has been refined to an ad hoc key-aided version and now incorporates a novel routing packet authentication mechanism in the ad hoc routing operation. A distinct character of this hybrid scheme is that a Mobile Agent can form a secure ad hoc network where the mobile hosts can be authorized and authenticated by the refined Mobile IP registration scheme. In these findings, we shall propose that the mobile hosts can follow a novel routing packet authentication mechanism to secure the routing packets by using the cryptography of the simple geometric properties of lines. Since the novel routing authentication mechanism does not need digital signatures for completing the routing packet integrity, in this hybrid authentication scheme, the cryptographic computation cost on the mobile hosts' side is relatively minimized. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | authentication | en_US |
dc.subject | geometric properties of lines | en_US |
dc.subject | malicious behaviors | en_US |
dc.subject | Mobile IP routing security | en_US |
dc.subject | wireless ad hoc networks | en_US |
dc.title | Mobile IP assistance in ad hoc routing security using geometric properties of lines | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1093/ietcom/e88-b.6.2557 | en_US |
dc.identifier.journal | IEICE TRANSACTIONS ON COMMUNICATIONS | en_US |
dc.citation.volume | E88B | en_US |
dc.citation.issue | 6 | en_US |
dc.citation.spage | 2557 | en_US |
dc.citation.epage | 2565 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000229823300042 | - |
dc.citation.woscount | 0 | - |
Appears in Collections: | Articles |