Practical solution for location privacy in mobile IPv6

Cited 5 time in webofscience Cited 0 time in scopus
  • Hit : 298
  • Download : 333
DC FieldValueLanguage
dc.contributor.authorChoi, S.ko
dc.contributor.authorKim, Kwangjoko
dc.contributor.authorKim, B.ko
dc.date.accessioned2011-07-06T07:13:15Z-
dc.date.available2011-07-06T07:13:15Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2003-
dc.identifier.citationINFORMATION SECURITY APPLICATIONS, v.2908, pp.69 - 83-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/24470-
dc.description.abstractMobile IP (MIP) enables the Mobile Node (MN) to move around without loosing their transport-layer connectivity by using resources in the foreign domain network. MIP is expected to be the core infrastructure of future mobile communication, but certain level of security services must be provided before the wide deployment of MIP. Security services, such as authentication and access control, have been considered since the birth of MIP, but little attention has been given to location privacy services despite of their increased significance in wireless network. MIPv6 uses IPSec to provide data confidentiality and authentication between Home Agent (HA) and the Mobile Node (MN). However, no practical solution was suggested for location information protection in MIP. During the past years a variety of theoretical concepts for location privacy have been proposed, but most of them are not applicable to MIP communication. So, in this paper, we identify required level of location privacy, and propose new protocol for providing the identified level of location privacy.-
dc.description.sponsorshipThe authors are deeply grateful to the anonymous reviewers for their valuable suggestions and comments on the ¯rst version of this paper.en
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherSPRINGER-VERLAG BERLIN-
dc.titlePractical solution for location privacy in mobile IPv6-
dc.typeArticle-
dc.identifier.wosid000189200400006-
dc.identifier.scopusid2-s2.0-35048902392-
dc.type.rimsART-
dc.citation.volume2908-
dc.citation.beginningpage69-
dc.citation.endingpage83-
dc.citation.publicationnameINFORMATION SECURITY APPLICATIONS-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorKim, Kwangjo-
dc.contributor.nonIdAuthorChoi, S.-
dc.contributor.nonIdAuthorKim, B.-
dc.type.journalArticleArticle; Proceedings Paper-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 5 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0