Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment

CGAs are cryptographically generated IPv6 addresses and are one of the most novel features introduced in IPv6. They have the promising potential of being the basis of authentication mechanisms for Mobile IPv6 because they do not require hosts to share information or security infrastructure. A mobil...

Full description

Bibliographic Details
Main Authors: Qadir, Sana, Siddiqi, Mohammad Umar
Format: Article
Language:English
Published: IJCSNS 2011
Subjects:
Online Access:http://irep.iium.edu.my/14279/
http://irep.iium.edu.my/14279/
http://irep.iium.edu.my/14279/1/2011_-_Sana_%26_Siddiqi_-_IJCSNS_-_Feb_2011.PDF
id iium-14279
recordtype eprints
spelling iium-142792012-01-10T02:42:17Z http://irep.iium.edu.my/14279/ Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment Qadir, Sana Siddiqi, Mohammad Umar TK5101 Telecommunication. Including telegraphy, radio, radar, television CGAs are cryptographically generated IPv6 addresses and are one of the most novel features introduced in IPv6. They have the promising potential of being the basis of authentication mechanisms for Mobile IPv6 because they do not require hosts to share information or security infrastructure. A mobile environment however has several resource constraints that must be considered before any mechanism can be deemed feasible. This paper undertakes to survey all the work done on CGAs and their performance. The goal is to identify and discuss parameters that have an impact on performance (e.g. the public-key cryptosystem being used). This should help in proposing possible modifications and parameters to ease the adoption of CGAs in a mobile environment. As a starting point, the CGA generation and verification algorithms are implemented with the help of a cryptographic library designed especially for embedded systems. An evaluation of the performance of this implementation is undertaken and a comparison is made with the results reported in previous studies. Based on this, a recommendation is made for the parameters that should be used by mobile nodes when using CGAs. The longterm modification that has the most potential for improving the performance of CGAs in a resource-limited setup is also identified IJCSNS 2011-02 Article PeerReviewed application/pdf en http://irep.iium.edu.my/14279/1/2011_-_Sana_%26_Siddiqi_-_IJCSNS_-_Feb_2011.PDF Qadir, Sana and Siddiqi, Mohammad Umar (2011) Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment. International Journal of Computer Science and Network Security (IJCSNS), 11 (2). pp. 24-31. ISSN 1738-7906 http://paper.ijcsns.org/07_book/html/201102/201102004.html
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic TK5101 Telecommunication. Including telegraphy, radio, radar, television
spellingShingle TK5101 Telecommunication. Including telegraphy, radio, radar, television
Qadir, Sana
Siddiqi, Mohammad Umar
Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
description CGAs are cryptographically generated IPv6 addresses and are one of the most novel features introduced in IPv6. They have the promising potential of being the basis of authentication mechanisms for Mobile IPv6 because they do not require hosts to share information or security infrastructure. A mobile environment however has several resource constraints that must be considered before any mechanism can be deemed feasible. This paper undertakes to survey all the work done on CGAs and their performance. The goal is to identify and discuss parameters that have an impact on performance (e.g. the public-key cryptosystem being used). This should help in proposing possible modifications and parameters to ease the adoption of CGAs in a mobile environment. As a starting point, the CGA generation and verification algorithms are implemented with the help of a cryptographic library designed especially for embedded systems. An evaluation of the performance of this implementation is undertaken and a comparison is made with the results reported in previous studies. Based on this, a recommendation is made for the parameters that should be used by mobile nodes when using CGAs. The longterm modification that has the most potential for improving the performance of CGAs in a resource-limited setup is also identified
format Article
author Qadir, Sana
Siddiqi, Mohammad Umar
author_facet Qadir, Sana
Siddiqi, Mohammad Umar
author_sort Qadir, Sana
title Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
title_short Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
title_full Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
title_fullStr Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
title_full_unstemmed Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
title_sort cryptographically generated addresses (cgas): a survey and an analysis of performance for use in mobile environment
publisher IJCSNS
publishDate 2011
url http://irep.iium.edu.my/14279/
http://irep.iium.edu.my/14279/
http://irep.iium.edu.my/14279/1/2011_-_Sana_%26_Siddiqi_-_IJCSNS_-_Feb_2011.PDF
first_indexed 2023-09-18T20:23:27Z
last_indexed 2023-09-18T20:23:27Z
_version_ 1777408259689283584