Title :
Network Access Control Mechanism Based on Locator/Identifier Split
Author :
Rui, Tu ; Jinshu, Su ; Feng, Chen
Author_Institution :
Sch. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
Abstract :
Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. ldquolocator/identifier splitrdquo has made it possible to build a network access control mechanism based on the permanent identifier. With the support of ldquolocator/identifier splitrdquo routing and addressing concept, the identifier-based access control (IBAC) makes network access control more accurate and efficient, and fits for mobile nodespsila access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet senderpsilas identity without the third part authentication, which greatly reduces the probability of ldquoidentifier spoofingrdquo.
Keywords :
IP networks; authorisation; message authentication; telecommunication network routing; telecommunication security; authentication; identifier spoofing; identifier-based access control; legacy IP address-based access control; locator/identifier split routing; network access control mechanism; packet sender identity; permanent identifier; self-verifying identifier; Access control; Authentication; Computer architecture; Computer science; Electronic mail; Kernel; Network address translation; Network topology; Routing; TCPIP; IBAC; Identifier Spoofing; Locator/Identifier Split; Self-verifying Identifier; access control;
Conference_Titel :
Networking, Architecture, and Storage, 2009. NAS 2009. IEEE International Conference on
Conference_Location :
Hunan
Print_ISBN :
978-0-7695-3741-2
DOI :
10.1109/NAS.2009.34