Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Arkko, V. Devarapalli, and F. Dupont. RFC 3776: Using IPsec to protect mobile IPv6 signaling between mobile nodes and home agents, June 2004.
T. Aura, P. Nikander, and G. Camarillo. Effects of mobility and multihoming on transport-protocol security. In Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp. 12–26, Oakland, CA, USA, May 9–12, 2004. IEEE Computer Society.
G. Bolch, S. Greiner, H. de Meer, and K. S. Trivedi. Queueing networks and Markov chains: modeling and performance evaluation with computer science applications. Wiley-Interscience, New York, NY, USA, 1998.
V. Devarapalli, R.Wakikawa, A. Petrescu, and P. Thubert. RFC 3963: Network Mobility (NEMO) Basic Support Protocol, January 2005.
O. Elkeelany, M. M. Matalgah, K. P. Sheikh, M. Thaker, G. Chaudhry, D. Medhi, and J. Qaddour. Performance analysis of IPsec protocol: encryption and authentication. In IEEE International Conference on Communications (ICC 2002), pp. 1164–1168, New York, NY, USA, April 28–May 2, 2002.
ETSI. Telecommunications and Internet converged services and protocols for advanced networking (TISPAN), NGN release 1, release definition. TR 180 001 v1.1.1 (2006-03), ETSI, 2006.
Z. Faigl, S. Lindskog, and A. Brunstrom. Analyzing IKEv2 performance when protecting mobile IPv6 Signaling. In Proceedings of the IEEE International Symposium on Wireless Communication Systems 2007, pp. 390–395, Trondheim, Norway, October 17–19, 2007.
L. Ferreira. Definition of reference scenarios for the evaluation of radio resource allocation algorithms. Internal document, NEWCOM, June 2006.
F. Granelli and G. Boato. A novel methodology for analysis of the computational complexity of block ciphers: Rijndael, Camellia and Shacal-2 compared. In Proceedings of the 3rd Conference on Security and Network Architectures (SAR’04), La Londe, France, June 2004.
I. Guardini. State of the art on IP mobility and related applicability scenarios: vision of the IST ENABLE project. In Proceedings of the B3G Cluster Workshop on Mobility Technologies in the Internet, Brussels, Belgium, October 2006.
A. Harbitter and D. A. Menascé. A methodology for analyzing the performance of authentication protocols. ACM Transaction on Information System Security, 5(4):458–491, November 2002.
D. Johnson, C. Perkins, and J. Arkko. RFC 3775: Mobility support in IPv6, June 2004.
C. Kaufman. RFC 4306: Internet key exchange (IKEv2) protocol, December 2005.
S. Kent and K. Seo. RFC 4301: Security architecture for the Internet protocol, December 2005.
R. Koodli. RFC 4068: Fast Handovers for Mobile IPv6, July 2005.
D. Le, X. Fu, and D. Hogrefe. A review of mobility support paradigms for the Internet. IEEE Communications Surveys and Tutorials, 8(1):38–51, January 2006.
Z. Nemeth and Cs. A. Szabo. Measurements to assist access network design with fixed WiMAX in urban environment. In Proceedings of the 1st international conference on Access networks (AccessNets’06), Athens, Greece, September 4–6, 2006. ACM Press.
P. Nikkander, J. Arkko, T. Aura, G. Montenegro, and E. Nordmark. RFC 4225: Mobile IP version 6 route optimization security design background, December 2005.
Nokia. Introducing mobile IPv6 in 2G and 3G mobile networks. White Paper, 2001.
H. Soliman, C. Castelluccia, K. El Malki, and L. Bellier. RFC 4140: Hierarchical Mobile IPv6 Mobility Management (HMIPv6), August 2005.
E. Spyropoulou, C. Ager, T. E. Levin, and C. E. Irvine. IPsec modulation for quality of security service. In Proceedings of the Third Annual International Systems Security Engineering Association Conference (2002 ISSEA Conference), Orlando, FL, USA, March 13–15, 2002.
C. Xenakis, N. Laoutaris, L. Merakos, and I. Stavrakakis. A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms. Computer Networks, 50(17):3225–3241, December 2006.
P. K. Yogender and H. H. Ali. Impacts of employing different security levels on QoS parameters in virtual private networks. In Proceedings of the 24th IASTED International Multi-Conference on Parallel and Distributed Computing and Networks (PDCN), Innsbruck, Austria, February 14–16, 2006.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Faigl, Z., Fazekas, P., Lindskog, S., Brunstrom, A. (2008). Analytical Analysis of the Performance Overheads of IPsec in MIPv6 Scenarios. In: István, F., Bitó, J., Bakki, P. (eds) Advances in Mobile and Wireless Communications. Lecture Notes Electrical Engineering, vol 16. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79041-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-540-79041-9_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-79040-2
Online ISBN: 978-3-540-79041-9
eBook Packages: EngineeringEngineering (R0)