Correspondent Node

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 1251 Experts worldwide ranked by ideXlab platform

Feng Li - One of the best experts on this subject based on the ideXlab platform.

  • a novel haleness and efficiency method for return routability procedure in mobile ipv6
    International Symposium on Communications and Information Technologies, 2005
    Co-Authors: Feng Li
    Abstract:

    In mobile IPv6 (MIPv6), triangle routing can be eliminated by means of route optimization (RO). Return routability procedure is designed to guarantee the security of route optimization, because it enables the Correspondent Node to obtain some reasonable assurance that the mobile Node is in fact addressable at its claimed care-of address. In this paper we discuss a novel method to perfect return routability procedure. The novel method provides a mechanism to make return routability procedure work well when the route between Correspondent Nodes and home agent or the route between home agent and mobile Node is broken without any lowering security.

Robert H Deng - One of the best experts on this subject based on the ideXlab platform.

  • using certificate based binding update protocol to hide the movement of mobile Nodes in mipv6
    Vehicular Technology Conference, 2006
    Co-Authors: Ying Qiu, Jianying Zhou, Feng Bao, Robert H Deng
    Abstract:

    When a mobile Node roams, its location information can be revealed from the IP prefix information of its care-of address. This paper proposes a technique for hiding a mobile Node's care-of address from its Correspondent Node and its home address from an eavesdropper using reverse tunneling mode. In the protocol, any two real addresses regarding route optimization will never be included in a traffic packet. Hence the movement of mobile Node can be hidden from third party monitoring

  • ACM Conference on Computer and Communications Security - Defending against redirect attacks in mobile IP
    Proceedings of the 9th ACM conference on Computer and communications security - CCS '02, 2002
    Co-Authors: Robert H Deng, Jianying Zhou, Feng Bao
    Abstract:

    The route optimization operation in Mobile IP Version 6 (MIPv6) allows direct routing from any Correspondent Node to any mobile Node and thus eliminates the problem of "triangle routing" present in the base Mobile IP Version 4 (MIPv4) protocol. Route optimization, however, requires that a mobile Node constantly inform its Correspondent Nodes about its new care-of addresses by sending them binding update messages. Unauthenticated or malicious binding updates open the door for intruders to perform redirect attacks, i.e., malicious acts which redirect traffic from Correspondent Nodes to locations chosen by intruders. How to protect binding update messages to defend against redirect attacks is a challenging problem given the open environment in which MIPv6 operates. In this paper, we first look at two solutions proposed by the IETF Mobile IP Working Group and point out their weaknesses. We then present a new protocol for securing binding update messages. We also show that our protocol achieves strong security and at the same time is highly scalable to wide spread deployment.

  • VTC Spring - Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6
    2006 IEEE 63rd Vehicular Technology Conference, 1
    Co-Authors: Ying Qiu, Jianying Zhou, Feng Bao, Robert H Deng
    Abstract:

    When a mobile Node roams, its location information can be revealed from the IP prefix information of its care-of address. This paper proposes a technique for hiding a mobile Node's care-of address from its Correspondent Node and its home address from an eavesdropper using reverse tunneling mode. In the protocol, any two real addresses regarding route optimization will never be included in a traffic packet. Hence the movement of mobile Node can be hidden from third party monitoring

Dong Chun Lee - One of the best experts on this subject based on the ideXlab platform.

  • Improved Authentication of Binding Update Protocol in Mobile IPv6 Networks
    Wireless Personal Communications, 2017
    Co-Authors: Dong Chun Lee, Kuinam J. Kim
    Abstract:

    The IPv6 standard documentation of IETF is recommending to execute Binding Update (BU) using Return Routability (RR) protocol. But, it doesn’t support entirely the security requirement of Mobile IPv6 (MIPv6) networks. To solve this problem, the IETF also counsels carrying out the BU using IPSec into RR protocol. But, that it uses in inefficient shot-term connection and mobile device of low-power is inefficient. We propose the efficient and secure Ticket based Binding Update (TBU) protocol for MIPv6 networks. In our TBU protocol, when Mobile Node (MN) first executes the BU, its Correspondent Node issues a ticket to MN. This ticket assist that it is able to do efficiently the BU whenever MN requires the BU for the future. The proposed TBU protocol need not be repeated equal BU course whenever the MN moves to foreign link or network, and is able to be executed in environment of not operating the Home Agent, and also easies scalability. We describe security analysis through attack scenarios and efficiency by comparing previous protocol schemes.

  • ICITCS - Improved Authentication Scheme of Binding Update Protocol in Mobile IPv6 Networks
    Wireless Personal Communications, 2015
    Co-Authors: Dong Chun Lee, Kuinam J. Kim
    Abstract:

    We propose the efficient and secure Ticket based Binding Update (TBU) protocol for MIPv6 networks. In our TBU protocol, when MN first executes the BU, its Correspondent Node (CN) issues a ticket to MN. This ticket assist that it is able to do efficiently the BU whenever Mobile Node (MN) requires the BU for the future. The proposed TBU protocol need not be repeated equal BU course whenever the MN moves to foreign link or network, and is able to be executed in environment of not operating the Home Agent (HA), and also easies scalability. We describe security analysis through attack scenarios by comparing previous protocol schemes.

  • improved authentication scheme of binding update protocol in mobile ipv6 networks
    International Conference on IT Convergence and Security ICITCS, 2014
    Co-Authors: Dong Chun Lee, Kuinam J. Kim
    Abstract:

    We propose the efficient and secure Ticket based Binding Update (TBU) protocol for MIPv6 networks. In our TBU protocol, when MN first executes the BU, its Correspondent Node (CN) issues a ticket to MN. This ticket assist that it is able to do efficiently the BU whenever Mobile Node (MN) requires the BU for the future. The proposed TBU protocol need not be repeated equal BU course whenever the MN moves to foreign link or network, and is able to be executed in environment of not operating the Home Agent (HA), and also easies scalability. We describe security analysis through attack scenarios by comparing previous protocol schemes.

  • a new authentication scheme of binding update protocol on handover in mobile ipv6 networks
    Embedded and Ubiquitous Computing, 2006
    Co-Authors: Jung Doo Koo, Jungsook Koo, Dong Chun Lee
    Abstract:

    We propose a new authentication scheme of binding update protocol, which its Correspondent Node (CN) issues a ticket to Mobile Node (MN) when MN first executes the Binding Update (BU). This ticket assist that it is able to do efficiently the BU whenever MN requires the BU for the future. The proposed protocol need not be repeated equal BU course whenever the MN moves to foreign link or network, and is able to be executed in environment of not operating the Home Agent (HA), and also easies scalability.

  • EUC Workshops - A new authentication scheme of binding update protocol on handover in mobile IPv6 networks
    Emerging Directions in Embedded and Ubiquitous Computing, 2006
    Co-Authors: Jung Doo Koo, Jungsook Koo, Dong Chun Lee
    Abstract:

    We propose a new authentication scheme of binding update protocol, which its Correspondent Node (CN) issues a ticket to Mobile Node (MN) when MN first executes the Binding Update (BU). This ticket assist that it is able to do efficiently the BU whenever MN requires the BU for the future. The proposed protocol need not be repeated equal BU course whenever the MN moves to foreign link or network, and is able to be executed in environment of not operating the Home Agent (HA), and also easies scalability.

Zheng Xiang - One of the best experts on this subject based on the ideXlab platform.

  • Mobile IPv4/v6 translation gateway
    2016
    Co-Authors: Zheng Xiang
    Abstract:

    RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a scheme to solve one of Mobile IPv4/v6 problems which Home Agent (HA) is located in IPv4 network, Correspondent Node (CN) is located in IPv6 network, while MN moves within IPv6 network. In the solution, a gateway called Mobile IPv4/v6 translation gateway (MIPv4/v6-TG) is introduced to bridge between IPv4 network and IPv6 network, which is made up of a traditional NAT-PT gateway and a Mobile IP application level gateway (MIP-ALG) built upon the NAT-PT gateway. MIP-ALG maintains a MIP table, a data structure, which is formed by entries. And it can work compatibly with RFC3344 and RFC3775

  • mobile ipv4 v6 translation gateway
    International Conference on Computer Science and Electronics Engineering, 2013
    Co-Authors: Zheng Xiang
    Abstract:

    IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a scheme to solve one of Mobile IPv4/v6 problems which Home Agent (HA) is located in IPv4 network, Correspondent Node (CN) is located in IPv6 network, while MN moves within IPv6 network. In the solution, a gateway called Mobile IPv4/v6 translation gateway (MIPv4/v6-TG) is introduced to bridge between IPv4 network and IPv6 network, which is made up of a traditional NAT-PT gateway and a Mobile IP application level gateway (MIP-ALG) built upon the NAT-PT gateway. MIP-ALG maintains a MIP table, a data structure, which is formed by entries. And it can work compatibly with RFC3344

  • Mobile IPv4/v6 translation gateway
    Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), 2013
    Co-Authors: Zheng Xiang, Zhengming Ma
    Abstract:

    IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a scheme to solve one of Mobile IPv4/v6 problems which Home Agent (HA) is located in IPv4 network, Correspondent Node (CN) is located in IPv6 network, while MN moves within IPv6 network. In the solution, a gateway called Mobile IPv4/v6 translation gateway (MIPv4/v6-TG) is introduced to bridge between IPv4 network and IPv6 network, which is made up of a traditional NAT-PT gateway and a Mobile IP application level gateway (MIP-ALG) built upon the NAT-PT gateway. MIP-ALG maintains a MIP table, a data structure, which is formed by entries. And it can work compatibly with RFC3344

  • Research on Mobility Management Based on MIP Table in Mixed IPv4/v6 Networks
    Applied Mechanics and Materials, 2013
    Co-Authors: Zheng Xiang, Zheng Li-ming
    Abstract:

    IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a scheme to solve one of Mobile IPv4/v6 problems which Home Agent (HA) locates in IPv6 network, and Correspondent Node (CN) locates in IPv4 network, while Mobile Node (MN) moves within IPv4 network. In the solution, a gateway called Mobile IPv4/v6 translation gateway (MIPv4/v6-TG) is introduced to bridge between IPv4 network and IPv6 network, which is made up of a traditional NAT-PT gateway and a Mobile IP application level gateway (MIP-ALG) built upon the NAT-PT gateway. MIP-ALG maintains a MIP table, a data structure, which is formed by entries. We use the MIP table to realize the communication between the IPv4 entities and the IPv6 entities. The creation, usage and update processes of MIP table are described in this paper. And it can work compatibly with RFC3344 and RFC3775.

  • CyberC - A Mobility Management Architecture for IPv4/IPv6 Networks
    2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
    Co-Authors: Zheng Xiang, Qiuli Kong
    Abstract:

    IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a solution to Mobile IPv4/v6 problems and gives an example when Home Agent(HA)located in IPv4 network, Correspondent Node(CN)located in IPv6 network, Mobile Node(MN) moving in IPv4/v6 mixed networks. A gateway called Mobile IPv4/v6 translation gateway (MIPv4/v6-TG) is introduced to bridge between IPv4 network and IPv6 network, which is made up of a NAT-PT gateway and a Mobile IP application level gateway (MIP-ALG) built upon the NAT-PT gateway. As a transition scheme, the idea is to make the solution compatible with RFC3344 and RFC3775. In this way, the Mobile IP entities in IPv4 network and the Mobile IP entities in IPv6 network will be transparent to each other.

Hyunseung Choo - One of the best experts on this subject based on the ideXlab platform.

  • network independent mobility management scheme using virtual ip addressing
    International Conference on Information Networking, 2015
    Co-Authors: Hyunseung Choo
    Abstract:

    Recent innovation in mobile technologies has changed from the static architecture of client-server relationships toward dynamic, mobile, and instant networks. Accordingly, many studies have been done to support the seamless mobility networks. However it is difficult to deploy such networks due to the need of a special network infrastructure supporting mobility management. In this paper, we propose a novel mobility management scheme without depending on any essential network infrastructure. It establishes a direct tunnel between a Mobile Node (MN) and a Correspondent Node (CN) using virtual IP addressing. The assigned virtual IP addresses of MN and CN are fixed during their communication session via the tunnel. When MN is moving, the changes of its physical IP address are updated to CN by the Virtual Tunnels (VTUN) layer to keep their communication session. The performance evaluation results show that the proposed scheme significantly reduces the L3 handover latency compared with that of PMIPv6.

  • ICOIN - Network independent mobility management scheme using virtual IP addressing
    2015 International Conference on Information Networking (ICOIN), 2015
    Co-Authors: Yongseung Lee, Hyunseung Choo, Dong-soo Kim
    Abstract:

    Recent innovation in mobile technologies has changed from the static architecture of client-server relationships toward dynamic, mobile, and instant networks. Accordingly, many studies have been done to support the seamless mobility networks. However it is difficult to deploy such networks due to the need of a special network infrastructure supporting mobility management. In this paper, we propose a novel mobility management scheme without depending on any essential network infrastructure. It establishes a direct tunnel between a Mobile Node (MN) and a Correspondent Node (CN) using virtual IP addressing. The assigned virtual IP addresses of MN and CN are fixed during their communication session via the tunnel. When MN is moving, the changes of its physical IP address are updated to CN by the Virtual Tunnels (VTUN) layer to keep their communication session. The performance evaluation results show that the proposed scheme significantly reduces the L3 handover latency compared with that of PMIPv6.

  • dual binding update with additional care of address in network mobility
    Mobile Ad-hoc and Sensor Networks, 2005
    Co-Authors: Kwangchul Jeong, Taejin Lee, Hyunseung Choo
    Abstract:

    In this paper, we propose an end-to-end route optimization scheme for nested mobile networks, which we refer to as Dual Binding Update (DBU). In general, the nested mobile networks easily suffer from a bi-directional pinball routing with hierarchically multiple mobile routers. To handle this matter, we provide a new binding update (BU) message to allow a Correspondent Node (CN) to keep an additional Care of Address (CoA). And we also allow intermediate Mobile Routers (MRs) maintain a routing table to forward packets inside the mobile network and replace a source address of the packet for reverse route optimization. We evaluate the DBU with existing schemes by analytical approaches. The results show that the DBU reduces the delay of route optimization significantly under various scenarios and also improves an average Round Trip Time (RTT) consistently for many nesting levels tested.

  • MSN - Dual binding update with additional care of address in network mobility
    Lecture Notes in Computer Science, 2005
    Co-Authors: Kwangchul Jeong, Taejin Lee, Hyunseung Choo
    Abstract:

    In this paper, we propose an end-to-end route optimization scheme for nested mobile networks, which we refer to as Dual Binding Update (DBU). In general, the nested mobile networks easily suffer from a bi-directional pinball routing with hierarchically multiple mobile routers. To handle this matter, we provide a new binding update (BU) message to allow a Correspondent Node (CN) to keep an additional Care of Address (CoA). And we also allow intermediate Mobile Routers (MRs) maintain a routing table to forward packets inside the mobile network and replace a source address of the packet for reverse route optimization. We evaluate the DBU with existing schemes by analytical approaches. The results show that the DBU reduces the delay of route optimization significantly under various scenarios and also improves an average Round Trip Time (RTT) consistently for many nesting levels tested.