Back
 IJCNS  Vol.2 No.7 , October 2009
An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split
Abstract: Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to build a network access control mechanism based on the permanent identifier. With the support of “Locator/Identifier Split” routing and addressing concept, the Identifier-based Access Control (IBAC) makes net-work access control more accurate and efficient, and fits for mobile nodes’ access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet sender’s identity without the third part authentication, which greatly reduces the probability of “Identifier Spoofing”.
Cite this paper: nullR. TU, J. SU and R. KONG, "An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split," International Journal of Communications, Network and System Sciences, Vol. 2 No. 7, 2009, pp. 641-644. doi: 10.4236/ijcns.2009.27072.
References

[1]   J. Scudder, “Routing/addressing problem solution space,” 2007, http://www.arin.net/meetings/minutes/ARIN_XX/ PDF/wednesday/SolutionSpace_Scudder.pdf.

[2]   R. Tu, J. S. Su, Z. W. Meng, and F. Zhao, “UCEN: User centric enterprise network,” in Proceedings IEEE ICACT’08, Phoenix Park, Korea, pp. 66–71, Feb 2008.

[3]   D. Meyer and K. Fall, “Report from the IAB workshop on routing and addressing,” Internet Draft, 2006.

[4]   R. Tu and J. S. Su, “A hash-based locator/ID mapping mechanism,” The Computer Engineering and Science, No. 1, pp. 9–12, 2009.

[5]   D. Meyer, “The locator identity separation protocol (LISP),” The Internet Protocol Journal, Vol. 11, No. 1, pp. 23, 2008.

[6]   A. J. Menezes, “Elliptic curve public key crytosystems,” Kluwer International Series in Engineering and Computer Science, 1993.

[7]   N. Jansma and B. Arrendondo, “Performance comparison of elliptic curve and RSA digital signature,” Technical Report, 2004. http://www.nicj.net/files/498termpaper.pdf.

[8]   Certicom Corp, “The elliptic curve crypto system for smart cards,” Certicom White Paper, 1998, http://www. comms.scitech.susx.ac.uk/fft/crypto/ECC_SC.pdf.

[9]   W. Chou and Laerence, “Elliptic curve cryptography and its applications to mobile device,” Project Report, Uni-versity of Maryland, 2003, http://www.cs.umd.edu/Hon-ors/reports/ECCpaper.pdf.

 
 
Top