Title :
Notice of Violation of IEEE Publication Principles
PKI and Secret Key Based Mobile IP Security
Author :
Dong Hu ; Donmg Zhou ; Ping Li
Author_Institution :
Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu
Abstract :
Notice of Violation of IEEE Publication Principles
"PKI and Secret Key Based Mobile IP Security"
by Dong Hu, Dong Zhou, and Ping Li
in the International Conference on Communications, Circuits and Systems Proceedings, June 2006, pp. 1605-1609
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE???s Publication Principles.
This paper is a duplication of the original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:
"PKI and Secret Key Cryptography Implementation for NEMO Security"
by Tat Kin Tan and Azman Samsudin
in the International Conference on Computer and Communication Engineering, May 2006
There exist some circulations of Internet drafts and specifications in today\´s industry for PKI implementation within the protocol of MIP, with or without the existence of IPSec. The focuses are particularly on how to fence off the unauthenticated or malicious bindings of binding updates that open the doors for various attacks and so as to also protect the binding updates messages to defend against redirection attacks in the challenging mobility environment. The paper firstly analyses the communication between MN-HA-CN on return routability (RR) and route optimization (RO), from both MIP and NEMO point of view. Then this paper introduces the innovative methods of implementing the secure communication of PKI together with the distribution of secret key methodology into the NEMO environment
Keywords :
IP networks; mobile communication; public key cryptography; routing protocols; Internet drafts; MN-HA-CN; NEMO environment; PKI; RR; binding updates messages; mobile IP; protocol; return routability; secret key; Authentication; Information security; Internet; Mobile communication; Multi-layer neural network; Peer to peer computing; Protection; Protocols; Public key; Public key cryptography;
Conference_Titel :
Communications, Circuits and Systems Proceedings, 2006 International Conference on
Conference_Location :
Guilin
Print_ISBN :
0-7803-9584-0
DOI :
10.1109/ICCCAS.2006.284980