About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International ICST Conference on Communications and Networking in China

Research Article

Design and Performance Evaluation of a Scalable Authentication Protocol in Mobile IP

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/CHINACOM.2007.4469570,
        author={Yong Lee and Goo Yeon Lee and Hwa Jong Kim},
        title={Design and Performance Evaluation of a Scalable Authentication Protocol in Mobile IP},
        proceedings={2nd International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2008},
        month={3},
        keywords={Authentication  Bandwidth  Computer crime  Home automation  Mobile computing  National security  Protection  Protocols  Public key  Relays},
        doi={10.1109/CHINACOM.2007.4469570}
    }
    
  • Yong Lee
    Goo Yeon Lee
    Hwa Jong Kim
    Year: 2008
    Design and Performance Evaluation of a Scalable Authentication Protocol in Mobile IP
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2007.4469570
Yong Lee1,*, Goo Yeon Lee2,*, Hwa Jong Kim2,*
  • 1: Dept. of Electronic Comm. Eng. Chungju National University, Korea
  • 2: Dept. of Electrical and Computer Eng. Kangwon National University, Korea
*Contact email: yleehyun@cjnu.ac.kr, leegyeon@kangwon.ac.kr, hjkim@kangwon.ac.kr

Abstract

Recently, along with the proliferatin of mobile devices connected through Internet, a secure and practical Mobile IP implementation became an important issue. A mobile IP can not work properly without authentication between the mobile node(MN), the home agent(HA) and the foreign agent(FA). In this paper, we propose a practical Mobile IP authentication protocol with public key cryptography only during the initial authentication. The proposed scheme is compatible with the conventional Mobile IP protocol and provides scalability for the number of MN’s. We also showed the secure operation of the proposed protocol and performance evaluation of the proposed protocol was made.

Keywords
Authentication Bandwidth Computer crime Home automation Mobile computing National security Protection Protocols Public key Relays
Published
2008-03-07
Publisher
IEEE
Modified
2011-07-17
http://dx.doi.org/10.1109/CHINACOM.2007.4469570
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL