Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment

CGAs are cryptographically generated IPv6 addresses and are one of the most novel features introduced in IPv6. They have the promising potential of being the basis of authentication mechanisms for Mobile IPv6 because they do not require hosts to share information or security infrastructure. A mobil...

Full description

Saved in:
Bibliographic Details
Main Authors: Qadir, Sana, Siddiqi, Mohammad Umar
Format: Article
Language:English
Published: IJCSNS 2011
Subjects:
Online Access:http://irep.iium.edu.my/14279/1/2011_-_Sana_%26_Siddiqi_-_IJCSNS_-_Feb_2011.PDF
http://irep.iium.edu.my/14279/
http://paper.ijcsns.org/07_book/html/201102/201102004.html
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.14279
record_format dspace
spelling my.iium.irep.142792012-01-10T02:42:17Z http://irep.iium.edu.my/14279/ Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment Qadir, Sana Siddiqi, Mohammad Umar TK5101 Telecommunication. Including telegraphy, radio, radar, television CGAs are cryptographically generated IPv6 addresses and are one of the most novel features introduced in IPv6. They have the promising potential of being the basis of authentication mechanisms for Mobile IPv6 because they do not require hosts to share information or security infrastructure. A mobile environment however has several resource constraints that must be considered before any mechanism can be deemed feasible. This paper undertakes to survey all the work done on CGAs and their performance. The goal is to identify and discuss parameters that have an impact on performance (e.g. the public-key cryptosystem being used). This should help in proposing possible modifications and parameters to ease the adoption of CGAs in a mobile environment. As a starting point, the CGA generation and verification algorithms are implemented with the help of a cryptographic library designed especially for embedded systems. An evaluation of the performance of this implementation is undertaken and a comparison is made with the results reported in previous studies. Based on this, a recommendation is made for the parameters that should be used by mobile nodes when using CGAs. The longterm modification that has the most potential for improving the performance of CGAs in a resource-limited setup is also identified IJCSNS 2011-02 Article REM application/pdf en http://irep.iium.edu.my/14279/1/2011_-_Sana_%26_Siddiqi_-_IJCSNS_-_Feb_2011.PDF Qadir, Sana and Siddiqi, Mohammad Umar (2011) Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment. International Journal of Computer Science and Network Security (IJCSNS), 11 (2). pp. 24-31. ISSN 1738-7906 http://paper.ijcsns.org/07_book/html/201102/201102004.html
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic TK5101 Telecommunication. Including telegraphy, radio, radar, television
spellingShingle TK5101 Telecommunication. Including telegraphy, radio, radar, television
Qadir, Sana
Siddiqi, Mohammad Umar
Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
description CGAs are cryptographically generated IPv6 addresses and are one of the most novel features introduced in IPv6. They have the promising potential of being the basis of authentication mechanisms for Mobile IPv6 because they do not require hosts to share information or security infrastructure. A mobile environment however has several resource constraints that must be considered before any mechanism can be deemed feasible. This paper undertakes to survey all the work done on CGAs and their performance. The goal is to identify and discuss parameters that have an impact on performance (e.g. the public-key cryptosystem being used). This should help in proposing possible modifications and parameters to ease the adoption of CGAs in a mobile environment. As a starting point, the CGA generation and verification algorithms are implemented with the help of a cryptographic library designed especially for embedded systems. An evaluation of the performance of this implementation is undertaken and a comparison is made with the results reported in previous studies. Based on this, a recommendation is made for the parameters that should be used by mobile nodes when using CGAs. The longterm modification that has the most potential for improving the performance of CGAs in a resource-limited setup is also identified
format Article
author Qadir, Sana
Siddiqi, Mohammad Umar
author_facet Qadir, Sana
Siddiqi, Mohammad Umar
author_sort Qadir, Sana
title Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
title_short Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
title_full Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
title_fullStr Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
title_full_unstemmed Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment
title_sort cryptographically generated addresses (cgas): a survey and an analysis of performance for use in mobile environment
publisher IJCSNS
publishDate 2011
url http://irep.iium.edu.my/14279/1/2011_-_Sana_%26_Siddiqi_-_IJCSNS_-_Feb_2011.PDF
http://irep.iium.edu.my/14279/
http://paper.ijcsns.org/07_book/html/201102/201102004.html
_version_ 1643606874344390656
score 13.188404