An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split

.
DOI: 10.4236/ijcns.2009.27072   PDF   HTML     5,112 Downloads   8,068 Views   Citations

Abstract

Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to build a network access control mechanism based on the permanent identifier. With the support of “Locator/Identifier Split” routing and addressing concept, the Identifier-based Access Control (IBAC) makes net-work access control more accurate and efficient, and fits for mobile nodes’ access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet sender’s identity without the third part authentication, which greatly reduces the probability of “Identifier Spoofing”.

Share and Cite:

R. TU, J. SU and R. KONG, "An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split," International Journal of Communications, Network and System Sciences, Vol. 2 No. 7, 2009, pp. 641-644. doi: 10.4236/ijcns.2009.27072.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] J. Scudder, “Routing/addressing problem solution space,” 2007, http://www.arin.net/meetings/minutes/ARIN_XX/ PDF/wednesday/SolutionSpace_Scudder.pdf.
[2] R. Tu, J. S. Su, Z. W. Meng, and F. Zhao, “UCEN: User centric enterprise network,” in Proceedings IEEE ICACT’08, Phoenix Park, Korea, pp. 66–71, Feb 2008.
[3] D. Meyer and K. Fall, “Report from the IAB workshop on routing and addressing,” Internet Draft, 2006.
[4] R. Tu and J. S. Su, “A hash-based locator/ID mapping mechanism,” The Computer Engineering and Science, No. 1, pp. 9–12, 2009.
[5] D. Meyer, “The locator identity separation protocol (LISP),” The Internet Protocol Journal, Vol. 11, No. 1, pp. 23, 2008.
[6] A. J. Menezes, “Elliptic curve public key crytosystems,” Kluwer International Series in Engineering and Computer Science, 1993.
[7] N. Jansma and B. Arrendondo, “Performance comparison of elliptic curve and RSA digital signature,” Technical Report, 2004. http://www.nicj.net/files/498termpaper.pdf.
[8] Certicom Corp, “The elliptic curve crypto system for smart cards,” Certicom White Paper, 1998, http://www. comms.scitech.susx.ac.uk/fft/crypto/ECC_SC.pdf.
[9] W. Chou and Laerence, “Elliptic curve cryptography and its applications to mobile device,” Project Report, Uni-versity of Maryland, 2003, http://www.cs.umd.edu/Hon-ors/reports/ECCpaper.pdf.

  
comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.