Font Size: a A A

Research On Security Problem Of Mobile IP Protocols

Posted on:2012-12-28Degree:MasterType:Thesis
Country:ChinaCandidate:W C RenFull Text:PDF
GTID:2178330332487349Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Mobile IP, which is the product of the new generation mobile communication, is akind of technology that mobile users still can continue to enjoy all of the originalnetwork services and rights when they roaming across the network based on TCP/IP,with not using to modify the computer original IP address. Its main purpose is that themobile node always select routing through local address whether one in local link ornot.As one of the several key technologies of mobile IP network, to quickly switchplays an vital role in improving the service quality. Mobile IP fast switching will makemore potential services in mobile communication become a reality, and satisfy the usersto communicate in anytime and anywhere. Compared with cable network, wirelesscommunication has more safety risk. As the result of the system research in mobile IPswitching technology, two security agreements are proposed, which not only satisfysafety requirements but also be improved in efficiency.The main contributions of the dissertation are listed as follows.(1) A new identity-based mobile IP registration protocol is proposed. The mobilenode and its home agent calculate their shared key separately through each others'public key, the private key, random parameters and the system parameters. The newprotocol utilizes the nature of bilinearity not only to verify the identity between themobile node and its agents, but also for the mobile node to prevent the complicatedbilinear pairing computations. The protocol resolve the issues of dynamic keyagreement and update efficiently.(2) A new mobile IP switching technology is proposed. The mechanism which hasthe same network structure with the hierarchical mobile IP, adds the function ofmulticast routing to mobile anchor points. The multicast address is instead of the localcare of address, thus the switching delay within the domain decreased. Node accessauthentication use the modified 2-hierarchical identity signature algorithm. Analysisshows that the scheme realizes two-way authentication while the switching efficiencyalso got a great improvement.
Keywords/Search Tags:Identity-based cryptography, Registration protocol, 2-Hierarchical identity signature algorithm, Handoff
PDF Full Text Request
Related items