Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
CGAs are cryptographically generated IPv6 addresses and are one of the most novel features introduced in IPv6. They have the promising potential of being the basis of authentication mechanisms for Mobile IPv6 because they do not require hosts to share information or security infrastructure. A mobil...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IJCSNS
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/14279/ http://irep.iium.edu.my/14279/ http://irep.iium.edu.my/14279/1/2011_-_Sana_%26_Siddiqi_-_IJCSNS_-_Feb_2011.PDF |
id |
iium-14279 |
---|---|
recordtype |
eprints |
spelling |
iium-142792012-01-10T02:42:17Z http://irep.iium.edu.my/14279/ Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment Qadir, Sana Siddiqi, Mohammad Umar TK5101 Telecommunication. Including telegraphy, radio, radar, television CGAs are cryptographically generated IPv6 addresses and are one of the most novel features introduced in IPv6. They have the promising potential of being the basis of authentication mechanisms for Mobile IPv6 because they do not require hosts to share information or security infrastructure. A mobile environment however has several resource constraints that must be considered before any mechanism can be deemed feasible. This paper undertakes to survey all the work done on CGAs and their performance. The goal is to identify and discuss parameters that have an impact on performance (e.g. the public-key cryptosystem being used). This should help in proposing possible modifications and parameters to ease the adoption of CGAs in a mobile environment. As a starting point, the CGA generation and verification algorithms are implemented with the help of a cryptographic library designed especially for embedded systems. An evaluation of the performance of this implementation is undertaken and a comparison is made with the results reported in previous studies. Based on this, a recommendation is made for the parameters that should be used by mobile nodes when using CGAs. The longterm modification that has the most potential for improving the performance of CGAs in a resource-limited setup is also identified IJCSNS 2011-02 Article PeerReviewed application/pdf en http://irep.iium.edu.my/14279/1/2011_-_Sana_%26_Siddiqi_-_IJCSNS_-_Feb_2011.PDF Qadir, Sana and Siddiqi, Mohammad Umar (2011) Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment. International Journal of Computer Science and Network Security (IJCSNS), 11 (2). pp. 24-31. ISSN 1738-7906 http://paper.ijcsns.org/07_book/html/201102/201102004.html |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
TK5101 Telecommunication. Including telegraphy, radio, radar, television |
spellingShingle |
TK5101 Telecommunication. Including telegraphy, radio, radar, television Qadir, Sana Siddiqi, Mohammad Umar Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment |
description |
CGAs are cryptographically generated IPv6 addresses and are
one of the most novel features introduced in IPv6. They have the promising potential of being the basis of authentication mechanisms for Mobile IPv6 because they do not require hosts to share information or security infrastructure. A mobile environment however has several resource constraints that must be considered before any mechanism can be deemed feasible. This paper undertakes to survey all the work done on CGAs and their performance. The goal is to identify and discuss parameters that have an impact on performance (e.g. the public-key cryptosystem being used). This should help in proposing possible modifications and parameters to ease the adoption of CGAs in a mobile environment.
As a starting point, the CGA generation and verification
algorithms are implemented with the help of a cryptographic
library designed especially for embedded systems. An evaluation of the performance of this implementation is undertaken and a comparison is made with the results reported in previous studies. Based on this, a recommendation is made for the parameters that
should be used by mobile nodes when using CGAs. The longterm
modification that has the most potential for improving the
performance of CGAs in a resource-limited setup is also
identified |
format |
Article |
author |
Qadir, Sana Siddiqi, Mohammad Umar |
author_facet |
Qadir, Sana Siddiqi, Mohammad Umar |
author_sort |
Qadir, Sana |
title |
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment |
title_short |
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment |
title_full |
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment |
title_fullStr |
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment |
title_full_unstemmed |
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment |
title_sort |
cryptographically generated addresses (cgas): a survey and
an analysis of performance for use in mobile environment |
publisher |
IJCSNS |
publishDate |
2011 |
url |
http://irep.iium.edu.my/14279/ http://irep.iium.edu.my/14279/ http://irep.iium.edu.my/14279/1/2011_-_Sana_%26_Siddiqi_-_IJCSNS_-_Feb_2011.PDF |
first_indexed |
2023-09-18T20:23:27Z |
last_indexed |
2023-09-18T20:23:27Z |
_version_ |
1777408259689283584 |