75,983 Hits in 4.7 sec

An architecture for the Internet Key Exchange Protocol

P.-C. Cheng
2001 IBM Systems Journal  
In this paper we present the design, rationale, and implementation of the Internet Key Exchange (IKE) Protocol.  ...  to acquire and verify public key certificates that are used for authentication of messages and identities in the IKE protocol.  ...  An FSM for a key exchange protocol (KEP), such as the IKE FSM, resides in the ISAKMP key exchange state.  ... 
doi:10.1147/sj.403.0721 fatcat:p33gk2iyobgpfm3f6tjkt6l23m

Security at the Internet layer

R. Oppliger
1998 Computer  
The RFC documents that specify the Internet Key Exchange will ultimately result in a protocol that is elective for IPv4 implementations and mandatory for IPv6 implementations.  ...  More recently, ISAKMP/Oakley has been renamed the Internet Key Exchange and will probably replace the Internet Key Management Protocol at some point.  ... 
doi:10.1109/2.708449 fatcat:ke2pemc6mfg4nfxfvvpmktbi3u

Internet security architecture

Refik Molva
1999 Computer Networks  
First the IPsec architecture including security protocols in the Internet Layer and the related key management proposals are introduced.  ...  This paper discusses the current cryptographic security measures available for the Internet infrastructure as an alternative to physical segregation.  ...  CONCLUSION An integrated security architecture exists for the Internet Protocol, including security protocols covering various services and joint management protocols for security association and key exchange  ... 
doi:10.1016/s1389-1286(98)00016-4 fatcat:7c4yhcoytva43jiqf2lynojlte

Toward a Tactile Internet Reference Architecture: Vision and Progress of the IEEE P1918.1 Standard [article]

Adnan Aijaz, Zaher Dawy, Nikolaos Pappas, Meryem Simsek, Sharief Oteafy, Oliver Holland
2018 arXiv   pre-print
The article provides an in-depth treatment of various architectural aspects including the key entities, the interfaces, the functional capabilities and the protocol stack.  ...  The main objective of this article is to present a reference architecture for the Tactile Internet based on the latest developments within the IEEE P1918.1 standard.  ...  Such protocols can also be applied for achieving high availability in wireless communications. B. Key Enablers for High Reliability Diversity is the key to achieving high reliability.  ... 
arXiv:1807.11915v1 fatcat:gm6qw74plvc7joa2j5gpdeam64

An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures

Aniruddha Bhattacharjya, Xiaofeng Zhong, Jing Wang
2018 International Journal of Information and Computer Security  
Our protocol implements perfect forward secrecy using Diffie-Hellman key exchange with renegotiation capability in every session with optimal asymmetric encryption padding and random salts.  ...  So here an E2E user two-way authenticated double encrypted messaging architecture based on hybrid RSA for private messaging is proposed.  ...  We have used D-H key exchange protocol for generation of the common shared key from output of our Prime generator class for two-way mutual authentication in our architecture and these keys are used in  ... 
doi:10.1504/ijics.2018.089593 fatcat:z47ztz6435dcxnqvvhkaa6gj5q

Automated Key Management for Router Updates

John William Atwood
2009 2009 First International Conference on Emerging Network Intelligence  
This requires, in turn, an architecture for managing the necessary security associations and keying material within an administrative region.  ...  Correct forwarding of packets requires the prior exchange of information among routers, using the appropriate routing protocol.  ...  Atwood acknowledges the support of the Natural Sciences and Engineering Research Council of Canada, through its Discovery Grants Program.  ... 
doi:10.1109/emerging.2009.23 fatcat:fh6e7mqutjggdljlziacvs3duy

Analysis of Security methods in Internet of Things

Saranya C
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated  ...  Internet of Things (IoT) is a new revolution for the internet. IoT is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service.  ...  It is based on Zero knowledge protocol and key exchange algorithm. The proposed architecture guarantees perfect forward secrecy. It aims low power consumption and fast computation.  ... 
doi:10.17762/ijritcc2321-8169.150446 fatcat:cx7woa2b7jhwjgl2gxofbv5j7i

A Lightweight and Identity-Based Network Architecture for the Internet of Things

Pedro Martinez-Julia, Antonio F. Skarmeta
2012 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing  
In this paper we show a network architecture for Next Generation Internet (NGI) that prevents operation traceability and protects the privacy of communication parties while raising their identity to be  ...  We also show the successful verification of the protocol security and demonstrate its feasibility and scalability showing its behavior when instantiated on top of two different architectures.  ...  Acknowledgments This work is partially supported by the European Commission's Seventh Framework Programme (FP7/2007(FP7/ -2013  ... 
doi:10.1109/imis.2012.101 dblp:conf/imis/Martinez-JuliaG12 fatcat:c43nmjynbfglbcqwscymgaf224

Security Challenges in the IP-based Internet of Things

Tobias Heer, Oscar Garcia-Morchon, René Hummen, Sye Loong Keoh, Sandeep S. Kumar, Klaus Wehrle
2011 Wireless personal communications  
In this paper, we discuss the applicability and limitations of existing Internet protocols and security architectures in the context of the Internet of Things.  ...  A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thingto-thing communication in embedded networks.  ...  Both protocols are able to perform an authenticated key exchange and set up the IPsec transforms for secure payload delivery.  ... 
doi:10.1007/s11277-011-0385-5 fatcat:qgq2ahp7qbhgnb43mlayxgnjty

A Peer-to-Peer Secure VoIP Architecture [chapter]

Simone Cirani, Riccardo Pecori, Luca Veltri
2011 Trustworthy Internet  
The Session Initiation Protocol (SIP) is the current signaling standard for such applications and allows users to establish and negotiate any end-to-end multimedia session.  ...  Voice over IP (VoIP) and multimedia real-time communications between two ore more parties are widely used over the Internet.  ...  Multimedia Internet KEYing (MIKEY) [4] is a key exchange protocol ancillary to SRTP, or other session-level security protocols, as it provides the means for setting up session keys.  ... 
doi:10.1007/978-88-470-1818-1_8 fatcat:7qxzfnwjqzdsji57mtvklwhsgi

Securing the wireless internet

V. Gupta, S. Gupta
2001 IEEE Communications Magazine  
We have created new classes for the Java 2 Micro-Edition platform that offer fundamental cryptographic operations such as message digests and ciphers as well as higher level security protocols like SSL  ...  Internet-enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future.  ...  We would also like to thank Nagendra Modadugu from Stanford University and Sheueling Chang from Sun Microsystems for their help with optimizing RSA.  ... 
doi:10.1109/35.968814 fatcat:zm3ooi6hbbggxkhjdgmhbzruae

A Security Framework for the Internet of Things in the Future Internet Architecture

Xiruo Liu, Meiyuan Zhao, Sugang Li, Feixiong Zhang, Wade Trappe
2017 Future Internet  
We propose an IoT name resolution service (IoT-NRS) as a core component of the middleware layer, and develop a lightweight keying protocol that establishes trust between an IoT device and the IoT-NRS.  ...  This paper addresses this issue by introducing a unified IoT framework based on the MobilityFirst future Internet architecture that explicitly focuses on supporting security for the IoT.  ...  The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.  ... 
doi:10.3390/fi9030027 fatcat:hesc24mb6fbtheo4tfiiiphh2u

A Multilayer Application-Aware IPSec Mechanism for IP Multimedia Subsystem

Chaitanya, Nirmal Roberts
2014 International Journal of Future Computer and Communication  
IMS Secure Key Exchange Protocol (ISKEP) To provide end-to-end security for UEs under the IMS architecture we propose a key exchange protocol i.e.  ...  For this we have designed a key exchange protocol. The remaining part of this paper is organized as follows. Section II briefly reviews IMS architecture and related work.  ...  The author's research interests include computer and storage networks, network management, service oriented architecture and IT infrastructure.  ... 
doi:10.7763/ijfcc.2014.v3.305 fatcat:7wdupgkhljddlazcyyko74q3j4

Secure Internet Applications Based on Mobile Agents

Cungang Yang
2006 International Journal of Network Security  
In this research, an Enhanced Role-based access control model (ERBAC) and an architecture for the ERBAC model are proposed.  ...  In addition, mobile agents make it feasible to automatically realize the security and privacy protection for Internet applications.  ...  Assume that each element of the architecture has gotten an X509 V.3 public key certificate and a private key from a public key certificate facility [6, 7] .  ... 
dblp:journals/ijnsec/Yang06 fatcat:5weqxqw26zbw3kqhhlkkgoztoe

Securing the internet of things with DTLS

Thomas Kothmayr, Wen Hu, Corinna Schmitt, Michael Bruenig, Georg Carle
2011 Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems - SenSys '11  
We propose an end-to-end security scheme build upon existing internet standards, specifically the Datagram Transport Layer Security protocol (DTLS).  ...  We present a system architecture for this scheme and show its feasibility through the evaluation of our implementation.  ...  Copyright 2011 ACM XXX-X-XXXXX-XXX-X ...$5.00 which we propose as a basis for the standardization of an end-to-end security scheme in the Internet of Things.  ... 
doi:10.1145/2070942.2070982 dblp:conf/sensys/KothmayrHSBC11 fatcat:jrnssmw5rfhgjgatqpb4fwvssa
« Previous Showing results 1 — 15 out of 75,983 results