{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:56Z","timestamp":1750306796216,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2490428.2490458","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"210-215","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A secure and efficient registration for IP mobility"],"prefix":"10.1145","author":[{"given":"Senthil Kumar","family":"Mathi","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, India"}]},{"given":"M. L.","family":"Valarmathi","sequence":"additional","affiliation":[{"name":"Government College of Technology, Coimbatore, Tamil Nadu, India"}]},{"given":"G.","family":"Ramprasath","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, India"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.592101"},{"key":"e_1_3_2_1_2_1","volume-title":"Symp. Parallel Architectures","author":"Sufatrio J.","year":"1999","unstructured":"J. Sufatrio and Lam. K. Y , 'Mobile-IP registration protocol : A security attack and new secure minimal public-key based authentication,' Proc.1999 Int . Symp. Parallel Architectures , September 1999 . J. Sufatrio and Lam. K. Y, 'Mobile-IP registration protocol: A security attack and new secure minimal public-key based authentication,' Proc.1999 Int. Symp. Parallel Architectures, September 1999."},{"key":"e_1_3_2_1_3_1","volume-title":"Work in progress","author":"S.","year":"1998","unstructured":"Jacobs, S. ' Mobile IP Public Key Based Authentication,' Internet Draft, draft jacobs-mobileip-pki-auth-00.txt , Work in progress , 1998 . Jacobs, S. 'Mobile IP Public Key Based Authentication,' Internet Draft, draft jacobs-mobileip-pki-auth-00.txt, Work in progress, 1998."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the International Conference on Parallel and Distributed Systems, IEEE Press","author":"An Efficient Public K.","year":"2000","unstructured":"Chung, S., Chae, K. ' An Efficient Public Key-based Authentication with Mobile IP in E- Commerce' , In: Proceedings of the International Conference on Parallel and Distributed Systems, IEEE Press , New York , 2000 . Chung, S., Chae, K. 'An Efficient Public Key-based Authentication with Mobile IP in E-Commerce', In: Proceedings of the International Conference on Parallel and Distributed Systems, IEEE Press, New York, 2000."},{"key":"e_1_3_2_1_5_1","unstructured":"'The NS Manual' http:\/\/www.isi.edu\/nsnam\/ns\/ns-documentation.html  'The NS Manual' http:\/\/www.isi.edu\/nsnam\/ns\/ns-documentation.html"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019179817993"},{"key":"e_1_3_2_1_7_1","volume-title":"A Mobile IP Authentication Protocol Based on Identity,' Journal of BUPT 3, 86--88","author":"X.","year":"2005","unstructured":"Zhang, S., Xu, G., Hu, Z., Yang, Y., Zhou, X. ' A Mobile IP Authentication Protocol Based on Identity,' Journal of BUPT 3, 86--88 , 2005 . Zhang, S., Xu, G., Hu, Z., Yang, Y., Zhou, X. 'A Mobile IP Authentication Protocol Based on Identity,' Journal of BUPT 3, 86--88, 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428848_67"},{"key":"e_1_3_2_1_9_1","first-page":"452","volume-title":"G 'Certificateless public key cryptography' in Laih","year":"2003","unstructured":"Al-Riyami, S., and Paterson, K . G 'Certificateless public key cryptography' in Laih , C. S. (Ed.), Asiacrypt , LNCS , vol. 2894 , pp. 452 -- 473 , 2003 . Al-Riyami, S., and Paterson, K. G 'Certificateless public key cryptography' in Laih, C. S. (Ed.), Asiacrypt, LNCS, vol. 2894, pp. 452--473, 2003."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10986-005-0008-5"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11596981_16"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.02.060445"},{"key":"e_1_3_2_1_13_1","first-page":"0070","volume":"2007","author":"Dang Lanjun","unstructured":"Lanjun Dang , Weidong Kou 'Improvement of Mobile IP Registration Using Self-Certified Public Keys' , IEEE Transactions On Mobile Computing, Tmc- 2007-03 - 0070 .R1, 2007. Lanjun Dang, Weidong Kou 'Improvement of Mobile IP Registration Using Self-Certified Public Keys', IEEE Transactions On Mobile Computing, Tmc-2007-03-0070.R1, 2007.","journal-title":"IEEE Transactions On Mobile Computing, Tmc-"},{"key":"e_1_3_2_1_14_1","volume-title":"IETF RFC 2002","author":"Perkins C.","year":"1996","unstructured":"C. Perkins , ' IP mobility support,' IETF RFC 2002 , Oct. 1996 . C. Perkins, 'IP mobility support,' IETF RFC 2002, Oct. 1996."},{"key":"e_1_3_2_1_15_1","volume-title":"IP mobility support for IPv4,' IETF RFC","author":"Perkins C.","year":"2002","unstructured":"C. Perkins , ' IP mobility support for IPv4,' IETF RFC 3344, Aug. 2002 . C. Perkins, 'IP mobility support for IPv4,' IETF RFC 3344, Aug. 2002."},{"issue":"1","key":"e_1_3_2_1_16_1","first-page":"38","article-title":"A secure Mobile IP registration protocol,' International J","volume":"1","author":"Yang C. Y.","year":"2005","unstructured":"C. Y. Yang and C. Y. Shiu , ' A secure Mobile IP registration protocol,' International J . Network Security , vol. 1 , no. 1 , pp. 38 -- 45 , July 2005 . C. Y. Yang and C. Y. Shiu, 'A secure Mobile IP registration protocol,' International J. Network Security, vol. 1, no. 1, pp. 38--45, July 2005.","journal-title":"Network Security"},{"key":"e_1_3_2_1_17_1","first-page":"2453","volume-title":"IEEE ICC'01","volume":"8","author":"Haverinen H.","year":"2001","unstructured":"H. Haverinen , N. Asokan , and T. Maattanen , ' Authentication and key generation for Mobile IP using GSM authentication and roaming,' in Proc . IEEE ICC'01 , vol. 8 , pp. 2453 -- 2457 , June 2001 . H. Haverinen, N. Asokan, and T. Maattanen, 'Authentication and key generation for Mobile IP using GSM authentication and roaming,' in Proc. IEEE ICC'01, vol. 8, pp. 2453--2457, June 2001."},{"key":"e_1_3_2_1_18_1","first-page":"709","volume-title":"IEEE ISPACS 2004","author":"Choi D. H.","year":"2004","unstructured":"D. H. Choi , H. Kim , and K. Jung , ' A secure Mobile IP authentication based on identification protocol,' in Proc . IEEE ISPACS 2004 , pp. 709 -- 712 , Nov. 2004 . D. H. Choi, H. Kim, and K. Jung, 'A secure Mobile IP authentication based on identification protocol,' in Proc. IEEE ISPACS 2004, pp. 709--712, Nov. 2004."},{"key":"e_1_3_2_1_19_1","first-page":"597","volume-title":"IEEE ICT'03","volume":"1","author":"Lee B. G.","year":"2003","unstructured":"B. G. Lee , D. H. Choi , H. G. Kim , S. W. Sohn , and K. H. Park , ' Mobile IP and WLAN with AAA authentication protocol using Identity-based cryptography,' in Proc . IEEE ICT'03 , vol. 1 , pp. 597 -- 603 , 23 Feb. 2003 . B. G. Lee, D. H. Choi, H. G. Kim, S. W. Sohn, and K. H. Park, 'Mobile IP and WLAN with AAA authentication protocol using Identity-based cryptography,' in Proc. IEEE ICT'03, vol. 1, pp.597--603, 23 Feb. 2003."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428848_67"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/19478.19483"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704155"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11600930_50"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1277867"},{"issue":"3","key":"e_1_3_2_1_25_1","first-page":"205","article-title":"A hash-based strong password authentication protocol with user anonymity,' International J","volume":"2","author":"Mangipudi K.","year":"2006","unstructured":"K. Mangipudi and R. Katti , ' A hash-based strong password authentication protocol with user anonymity,' International J . Netw. Security , vol. 2 , no. 3 , pp. 205 -- 209 , May 2006 . K. Mangipudi and R. Katti, 'A hash-based strong password authentication protocol with user anonymity,' International J. Netw. Security, vol. 2, no. 3, pp. 205--209, May 2006.","journal-title":"Netw. Security"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2003.1265853"},{"key":"e_1_3_2_1_28_1","volume-title":"Authentication, authorization, and accounting (AAA) registration keys for Mobile IP,' IETF RFC","author":"Perkins C.","year":"2005","unstructured":"C. Perkins and P. Calhoun , ' Authentication, authorization, and accounting (AAA) registration keys for Mobile IP,' IETF RFC 3957, Mar. 2005 . C. Perkins and P. Calhoun, 'Authentication, authorization, and accounting (AAA) registration keys for Mobile IP,' IETF RFC 3957, Mar. 2005."},{"key":"e_1_3_2_1_29_1","volume-title":"HMAC: keyed-hashing for message authentication,' IETF RFC","author":"Krawczyk H.","year":"1997","unstructured":"H. Krawczyk , M. Bellare , and R. Canetti , ' HMAC: keyed-hashing for message authentication,' IETF RFC 2104, Feb. 1997 . H. Krawczyk, M. Bellare, and R. Canetti, 'HMAC: keyed-hashing for message authentication,' IETF RFC 2104, Feb. 1997."},{"key":"e_1_3_2_1_30_1","volume-title":"keyed-hashing for message authentication","author":"RFC","year":"1997","unstructured":"RFC 2104 'HMAC : keyed-hashing for message authentication ', 1997 . RFC 2104 'HMAC: keyed-hashing for message authentication', 1997."},{"key":"e_1_3_2_1_31_1","volume-title":"International Journal of Network Security","author":"Yang Cheng-Ying","year":"2005","unstructured":"Cheng-Ying Yang and Cheng-Yeh Shiu ,' A Secure Mobile IP Registration Protocol' , International Journal of Network Security , Vol. 1 , No.1, PP. 38--45, July 2005 Cheng-Ying Yang and Cheng-Yeh Shiu,' A Secure Mobile IP Registration Protocol', International Journal of Network Security, Vol.1, No.1, PP.38--45, July 2005"},{"key":"e_1_3_2_1_32_1","volume-title":"Secure Mobile IP Registration Scheme with AAA from Parings to Reduce Registration Delay","author":"Cao Xuefei","year":"2006","unstructured":"Xuefei Cao , Weidong Kou , Huaping Li , ' Secure Mobile IP Registration Scheme with AAA from Parings to Reduce Registration Delay ', IEEE , 2006 . Xuefei Cao, Weidong Kou, Huaping Li, 'Secure Mobile IP Registration Scheme with AAA from Parings to Reduce Registration Delay', IEEE, 2006."},{"key":"e_1_3_2_1_33_1","volume-title":"Lanjun Dang and Kai Fan,' Efficient Mobile IP Registration from Pairings' Key Laboratory of integrated Service Networks","author":"Cao Xuefei","year":"2006","unstructured":"Xuefei Cao , Weidong Kou , Lanjun Dang and Kai Fan,' Efficient Mobile IP Registration from Pairings' Key Laboratory of integrated Service Networks , Xidian University , Xi'an 710071, P. R. China, November 2006 . Xuefei Cao, Weidong Kou, Lanjun Dang and Kai Fan,' Efficient Mobile IP Registration from Pairings' Key Laboratory of integrated Service Networks, Xidian University, Xi'an 710071, P. R. China, November 2006."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 2003 International Conference on Parallel Processing Workshops (ICPPW'03)","author":"Yang Chou-Chen","year":"2016","unstructured":"Chou-Chen Yang , Jian-Wei Li , Ting-Yi Chang ,' A Novel Mobile IP Registration Scheme for Hierarchical Mobility Management' , Proceedings of the 2003 International Conference on Parallel Processing Workshops (ICPPW'03) , IEEE,1530-- 2016 , 2003. Chou-Chen Yang, Jian-Wei Li, Ting-Yi Chang,' A Novel Mobile IP Registration Scheme for Hierarchical Mobility Management', Proceedings of the 2003 International Conference on Parallel Processing Workshops (ICPPW'03), IEEE,1530--2016, 2003."}],"event":{"name":"SECURIT '12: First International Conference on Security of Internet of Things","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","TCG Trusted Computing Group","Amrita Amrita Vishwa Vidyapeetham","CSA Computer Science Association"],"location":"Kollam India","acronym":"SECURIT '12"},"container-title":["Proceedings of the First International Conference on Security of Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490458","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490428.2490458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:35Z","timestamp":1750232075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490458"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":33,"alternative-id":["10.1145\/2490428.2490458","10.1145\/2490428"],"URL":"https:\/\/doi.org\/10.1145\/2490428.2490458","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}