• DocumentCode
    460601
  • Title

    Notice of Violation of IEEE Publication Principles
    PKI and Secret Key Based Mobile IP Security

  • Author

    Dong Hu ; Donmg Zhou ; Ping Li

  • Author_Institution
    Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu
  • Volume
    3
  • fYear
    2006
  • fDate
    25-28 June 2006
  • Firstpage
    1605
  • Lastpage
    1609
  • Abstract
    Notice of Violation of IEEE Publication Principles

    "PKI and Secret Key Based Mobile IP Security"
    by Dong Hu, Dong Zhou, and Ping Li
    in the International Conference on Communications, Circuits and Systems Proceedings, June 2006, pp. 1605-1609

    After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE???s Publication Principles.

    This paper is a duplication of the original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

    Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:

    "PKI and Secret Key Cryptography Implementation for NEMO Security"
    by Tat Kin Tan and Azman Samsudin
    in the International Conference on Computer and Communication Engineering, May 2006

    There exist some circulations of Internet drafts and specifications in today\´s industry for PKI implementation within the protocol of MIP, with or without the existence of IPSec. The focuses are particularly on how to fence off the unauthenticated or malicious bindings of binding updates that open the doors for various attacks and so as to also protect the binding updates messages to defend against redirection attacks in the challenging mobility environment. The paper firstly analyses the communication between MN-HA-CN on return routability (RR) and route optimization (RO), from both MIP and NEMO point of view. Then this paper introduces the innovative methods of implementing the secure communication of PKI together with the distribution of secret key methodology into the NEMO environment
  • Keywords
    IP networks; mobile communication; public key cryptography; routing protocols; Internet drafts; MN-HA-CN; NEMO environment; PKI; RR; binding updates messages; mobile IP; protocol; return routability; secret key; Authentication; Information security; Internet; Mobile communication; Multi-layer neural network; Peer to peer computing; Protection; Protocols; Public key; Public key cryptography;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications, Circuits and Systems Proceedings, 2006 International Conference on
  • Conference_Location
    Guilin
  • Print_ISBN
    0-7803-9584-0
  • Type

    conf

  • DOI
    10.1109/ICCCAS.2006.284980
  • Filename
    4064206