• Tidak ada hasil yang ditemukan

Improving the security of mobile IPV6 signalling using KECCAK / SHA-3 ABSTRACT

N/A
N/A
Protected

Academic year: 2024

Membagikan "Improving the security of mobile IPV6 signalling using KECCAK / SHA-3 ABSTRACT"

Copied!
1
0
0

Teks penuh

(1)

Improving the security of mobile IPV6 signalling using KECCAK / SHA-3

ABSTRACT

Most people nowadays use their mobile devices to stay connected to the internet all over the place and all the time. In order to provide their customers with excellent service, all Internet Service Provider (ISP) worked together to make a handover process from one ISP to another. The signalling process is an integral part of the handover that makes it easier for devices to register their new address. If no security is used, attackers could initiate an adverse action during the signalling time. The Mobile IPv6 standard mandates the use of Internet Protocol Security (IPsec) to secure the handover process, particularly during the signalling step. The conventional IPsec uses Keyed-Hash Message Authentication Code- Secure Hash Algorithm-1 (HMAC-SHA-1) to authenticate signalling messages. However, the SHA-1 has been detected and broken by collision attacks and length-extension attacks.

Hence, the signalling process on the Mobile IPv6 is vulnerable. The aim of this paper is to find a hash algorithm that is resistant to both attacks. Subsequently, it can be implemented on IPsec to secure the Mobile IPv6 signalling process. The experimental result showed that the SHA-3 algorithm could fulfil the requirements. It can enhance security performance and, at the same time, does not lengthen the authentication time significantly.

Referensi

Dokumen terkait

In the end of this research, we will recommend the mobile devices users of which the best video codec that compatible for their mobile devices to view video with the least used

IMPROVING THE QUALITY OF THREE LANGUAGE CENTRES IN SALATIGA THROUGH GOOD RECRUITMENT PROCESS AND TEACHING EFFECTIVENESS STANDARD.. Sesillia Rani Setyo

37 The Influence of Perceived Security and Perceived Enjoyment on Intention to Use with Attitude Towards Use as Intervening Variable on Mobile Payment Customer in Surabaya

m-Learning ส าหรับนักเรียนระดับมัธยมศึกษาตอนปลาย ส านักงานเขตพื้นที่การศึกษา มัธยมศึกษา เขต 11 The Development of English Language Instructional Model Using Mobile Electronic Devices

"Mobile cloud computing security using cryptographic hash function algorithm", 2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering

This study aims to assess biometric authentication under different conditions, identify facial and fingerprint security levels, and evaluate the architectural security and spoofability

Applications Mobile Operating Sys Mobile Devices Wireless Networks Figure 2.1: Mobile Computing: layered approach The mobile operating systems level provides tools for application

3.2.3 The Effect of Fulfillment Factors in the Use of National Health Insurance Mobile Applications JKN on the Satisfaction of Participants of the Health Social Security Organizing