{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:40Z","timestamp":1750306720350,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,21]],"date-time":"2014-09-21T00:00:00Z","timestamp":1411257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,21]]},"DOI":"10.1145\/2642687.2642690","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"95-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure IPsec based offload architectures for mobile data"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Migault","sequence":"first","affiliation":[{"name":"Orange Lab, Issy-les Moulineaux, France"}]},{"given":"Daniel","family":"Palomares","sequence":"additional","affiliation":[{"name":"Orange Lab, Issy-les Moulineaux, France"}]},{"given":"Hendrik","family":"Hendrik","sequence":"additional","affiliation":[{"name":"Orange Lab, Issy-les Moulineaux, France"}]},{"given":"Maryline","family":"Laurent","sequence":"additional","affiliation":[{"name":"Institut Mines-TELECOM, UMR CNRS 5157 SAMOVAR 1, Evry, France"}]}],"member":"320","published-online":{"date-parts":[[2014,9,21]]},"reference":[{"volume-title":"3GPP system to Wireless Local Area Network (WLAN) interworking","year":"2011","key":"e_1_3_2_1_1_1","unstructured":"3GPP-LTE : 3GPP system to Wireless Local Area Network (WLAN) interworking ; System description, TS 23.234, Release 10. ETSI Standard , march 2011 . 3GPP-LTE: 3GPP system to Wireless Local Area Network (WLAN) interworking; System description, TS 23.234, Release 10. ETSI Standard, march 2011."},{"key":"e_1_3_2_1_2_1","unstructured":"AT&T Corporation originally American Telephone and Telegraph Company. URL: http:\/\/www.att.com\/.  AT&T Corporation originally American Telephone and Telegraph Company. URL: http:\/\/www.att.com\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Definitions of Managed Objects for IP Storage User Identity Authorization, may","author":"Bakke M.","year":"2006","unstructured":"M. Bakke and J. Muchow . Definitions of Managed Objects for IP Storage User Identity Authorization, may 2006 . RFC 4545 (Proposed Standard) . M. Bakke and J. Muchow. Definitions of Managed Objects for IP Storage User Identity Authorization, may 2006. RFC 4545 (Proposed Standard)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814456"},{"key":"e_1_3_2_1_5_1","volume-title":"Microsoft Research","author":"Chou P. A.","year":"2007","unstructured":"P. A. Chou and Y. Wu . Network Coding for the Internet and Wireless Networks. MSR-TR-2007--70 . Microsoft Research , June 2007 . P. A. Chou and Y. Wu. Network Coding for the Internet and Wireless Networks. MSR-TR-2007--70. Microsoft Research, June 2007."},{"key":"e_1_3_2_1_6_1","first-page":"2015","author":"Networking Index Cisco Visual","year":"2010","unstructured":"Cisco Visual Networking Index : Global Mobile Data Traffic Forecast Update , 2010 -- 2015 . URL: http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns341\/ns525\/ns537\/ns705%\/ns827\/white_paper_c11--520862.html, february 2011. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2010--2015. URL: http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns341\/ns525\/ns537\/ns705%\/ns827\/white_paper_c11--520862.html, february 2011.","journal-title":"Global Mobile Data Traffic Forecast Update"},{"key":"e_1_3_2_1_7_1","volume-title":"MOBIKEv2: MOBIKE extension for Transport mode. draft. (Work in Progress) Internet Engineering Task Force, november","author":"Daniel M.","year":"2014","unstructured":"M. Daniel . MOBIKEv2: MOBIKE extension for Transport mode. draft. (Work in Progress) Internet Engineering Task Force, november 2014 . M. Daniel. MOBIKEv2: MOBIKE extension for Transport mode. draft. (Work in Progress) Internet Engineering Task Force, november 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555843"},{"key":"e_1_3_2_1_9_1","volume-title":"The Transport Layer Security (TLS) Protocol Version 1.2, august","author":"Dierks T.","year":"2008","unstructured":"T. Dierks and E. Rescorla . The Transport Layer Security (TLS) Protocol Version 1.2, august 2008 . RFC 5246 (Proposed Standard), Updated by RFCs 5746, 5878, 6176. T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2, august 2008. RFC 5246 (Proposed Standard), Updated by RFCs 5746, 5878, 6176."},{"key":"e_1_3_2_1_10_1","volume-title":"The AES-CBC Cipher Algorithm and Its Use with IPsec, september","author":"Frankel S.","year":"2003","unstructured":"S. Frankel , R. Glenn , and S. Kelly . The AES-CBC Cipher Algorithm and Its Use with IPsec, september 2003 . RFC 3602 (Proposed Standard) . S. Frankel, R. Glenn, and S. Kelly. The AES-CBC Cipher Algorithm and Its Use with IPsec, september 2003. RFC 3602 (Proposed Standard)."},{"key":"e_1_3_2_1_11_1","series-title":"Wiley series in communications networking & distributed systems","doi-asserted-by":"crossref","DOI":"10.1002\/9780470772898","volume-title":"Host Identity Protocol (HIP): towards the secure mobile Internet","author":"Gurtov A.","year":"2008","unstructured":"A. Gurtov . Host Identity Protocol (HIP): towards the secure mobile Internet . Wiley series in communications networking & distributed systems . Wiley , 2008 . A. Gurtov. Host Identity Protocol (HIP): towards the secure mobile Internet. Wiley series in communications networking & distributed systems. Wiley, 2008."},{"key":"e_1_3_2_1_12_1","volume-title":"Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM), january","author":"Haverinen H.","year":"2006","unstructured":"H. Haverinen and J. Salowey . Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM), january 2006 . RFC 4186 (Informational) . H. Haverinen and J. Salowey. Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM), january 2006. RFC 4186 (Informational)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2010.5560103"},{"key":"e_1_3_2_1_14_1","unstructured":"C. S. Inc. \"voice and video enabled ipsec vpn (v3pn) solution reference network design\". URL: http:\/\/www.cisco.com\/en\/US\/docs\/solutions\/Enterprise\/WAN_and_MAN\/V3PN_S%RND\/v3p_plan.html#wp1035443.  C. S. Inc. \"voice and video enabled ipsec vpn (v3pn) solution reference network design\". URL: http:\/\/www.cisco.com\/en\/US\/docs\/solutions\/Enterprise\/WAN_and_MAN\/V3PN_S%RND\/v3p_plan.html#wp1035443."},{"key":"e_1_3_2_1_15_1","unstructured":"iPass: Enterprise Mobility Services. URL: http:\/\/www3.ipass.com\/.  iPass: Enterprise Mobility Services. URL: http:\/\/www3.ipass.com\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923722"},{"key":"e_1_3_2_1_17_1","volume-title":"Internet Key Exchange Protocol Version 2 (IKEv2), september","author":"Kaufman C.","year":"2010","unstructured":"C. Kaufman , P. Hoffman , Y. Nir , and P. Eronen . Internet Key Exchange Protocol Version 2 (IKEv2), september 2010 . RFC 5996 (Proposed Standard), Updated by RFC 5998. C. Kaufman, P. Hoffman, Y. Nir, and P. Eronen. Internet Key Exchange Protocol Version 2 (IKEv2), september 2010. RFC 5996 (Proposed Standard), Updated by RFC 5998."},{"key":"e_1_3_2_1_18_1","volume-title":"IP Encapsulating Security Payload (ESP), december","author":"Kent S.","year":"2005","unstructured":"S. Kent . IP Encapsulating Security Payload (ESP), december 2005 . RFC 4303 (Proposed Standard) . S. Kent. IP Encapsulating Security Payload (ESP), december 2005. RFC 4303 (Proposed Standard)."},{"key":"e_1_3_2_1_19_1","volume-title":"Security Architecture for the Internet Protocol, december","author":"Kent S.","year":"2005","unstructured":"S. Kent and K. Seo . Security Architecture for the Internet Protocol, december 2005 . RFC 4301 (Proposed Standard), Updated by RFC 6040. S. Kent and K. Seo. Security Architecture for the Internet Protocol, december 2005. RFC 4301 (Proposed Standard), Updated by RFC 6040."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267359.1267389"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921203"},{"key":"e_1_3_2_1_22_1","volume-title":"Wireless Internet access: 3G vs. WiFi? Telecommunications Policy, 27(5--6):351--370","author":"Lehr W.","year":"2003","unstructured":"W. Lehr and L. W. Mcknight . Wireless Internet access: 3G vs. WiFi? Telecommunications Policy, 27(5--6):351--370 , 2003 . W. Lehr and L. W. Mcknight. Wireless Internet access: 3G vs. WiFi? Telecommunications Policy, 27(5--6):351--370, 2003."},{"key":"e_1_3_2_1_23_1","volume-title":"The Use of HMAC-SHA-1--96 within ESP and AH, november","author":"Madson C.","year":"1998","unstructured":"C. Madson and R. Glenn . The Use of HMAC-SHA-1--96 within ESP and AH, november 1998 . RFC 2404 (Proposed Standard) . C. Madson and R. Glenn. The Use of HMAC-SHA-1--96 within ESP and AH, november 1998. RFC 2404 (Proposed Standard)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1698924.1699289"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.80"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503250"},{"key":"e_1_3_2_1_27_1","volume-title":"July","author":"Migault D.","year":"2014","unstructured":"D. Migault and V. Smyslov . Clone IKE SA Extension. draft. (Work in Progress) Internet Engineering Task Force , July 2014 . D. Migault and V. Smyslov. Clone IKE SA Extension. draft. (Work in Progress) Internet Engineering Task Force, July 2014."},{"key":"e_1_3_2_1_28_1","volume-title":"IETF, august","author":"Nikander P.","year":"2008","unstructured":"P. Nikander and J. Melen . A Bound End-to-End Tunnel (BEET) mode for ESP. (Work in Progress) , IETF, august 2008 . P. Nikander and J. Melen. A Bound End-to-End Tunnel (BEET) mode for ESP. (Work in Progress), IETF, august 2008."},{"key":"e_1_3_2_1_29_1","volume-title":"IPsec Cluster Problem Statement, october","author":"Nir Y.","year":"2010","unstructured":"Y. Nir . IPsec Cluster Problem Statement, october 2010 . RFC 6027 (Informational) . Y. Nir. IPsec Cluster Problem Statement, october 2010. RFC 6027 (Informational)."},{"key":"e_1_3_2_1_30_1","volume-title":"Analysys Masson, december","author":"Norman T.","year":"2011","unstructured":"T. Norman and R. Linton . The case for Wi-Fi offload: the costs and benefits of Wi-Fi as a capacity overlay in mobile networks. Technical report , Analysys Masson, december 2011 . T. Norman and R. Linton. The case for Wi-Fi offload: the costs and benefits of Wi-Fi as a capacity overlay in mobile networks. Technical report, Analysys Masson, december 2011."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342468.2342476"},{"key":"e_1_3_2_1_32_1","volume-title":"Failure Preventive Mechanism for IPsec Gateways. In International Conference on Communications and Information Technology - ICCIT'13","author":"Palomares D.","year":"2013","unstructured":"D. Palomares , D. Migault , and M. Laurent . Failure Preventive Mechanism for IPsec Gateways. In International Conference on Communications and Information Technology - ICCIT'13 , June 2013 . D. Palomares, D. Migault, and M. Laurent. Failure Preventive Mechanism for IPsec Gateways. In International Conference on Communications and Information Technology - ICCIT'13, June 2013."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.25"},{"key":"e_1_3_2_1_34_1","volume-title":"Apr.","author":"Pantos R.","year":"2013","unstructured":"R. Pantos and W. May . HTTP Live Streaming. draft. (Work in Progress) Internet Engineering Task Force , Apr. 2013 . R. Pantos and W. May. HTTP Live Streaming. draft. (Work in Progress) Internet Engineering Task Force, Apr. 2013."},{"key":"e_1_3_2_1_35_1","unstructured":"POLQA\n  : ITU-T Recommendation P.863: Perceptual Objective listening Quality Assessment. URL: http:\/\/www.itu.int\/rec\/T-REC-P.863\/en.  POLQA: ITU-T Recommendation P.863: Perceptual Objective listening Quality Assessment. URL: http:\/\/www.itu.int\/rec\/T-REC-P.863\/en."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228338"},{"key":"e_1_3_2_1_37_1","volume-title":"Datagram Transport Layer Security Version 1.2, january","author":"Rescorla E.","year":"2012","unstructured":"E. Rescorla and N. Modadugu . Datagram Transport Layer Security Version 1.2, january 2012 . RFC 6347 (Proposed Standard) . E. Rescorla and N. Modadugu. Datagram Transport Layer Security Version 1.2, january 2012. RFC 6347 (Proposed Standard)."},{"key":"e_1_3_2_1_38_1","volume-title":"Operator's Dilemma : How to take advantage of the growing mobile Internet. URL: http:\/\/www.notava.com\/notava\/uploads\/Whitepapers\/Internet_growth_V10.pd%f, may","author":"Risto S.","year":"2010","unstructured":"S. Risto and L. Antti . Operator's Dilemma : How to take advantage of the growing mobile Internet. URL: http:\/\/www.notava.com\/notava\/uploads\/Whitepapers\/Internet_growth_V10.pd%f, may 2010 . S. Risto and L. Antti. Operator's Dilemma : How to take advantage of the growing mobile Internet. URL: http:\/\/www.notava.com\/notava\/uploads\/Whitepapers\/Internet_growth_V10.pd%f, may 2010."},{"key":"e_1_3_2_1_39_1","volume-title":"July","author":"Sathyanarayan P.","year":"2013","unstructured":"P. Sathyanarayan , S. Hanna , S. Melam , Y. Nir , D. Migault , and K. Pentikousis . Auto Discovery VPN Protocol. draft. (Work in Progress) Internet Engineering Task Force , July 2013 . P. Sathyanarayan, S. Hanna, S. Melam, Y. Nir, D. Migault, and K. Pentikousis. Auto Discovery VPN Protocol. draft. (Work in Progress) Internet Engineering Task Force, July 2013."},{"key":"e_1_3_2_1_40_1","volume-title":"Real Time Streaming Protocol (RTSP), april","author":"Schulzrinne H.","year":"1998","unstructured":"H. Schulzrinne , A. Rao , and R. Lanphier . Real Time Streaming Protocol (RTSP), april 1998 . RFC 2326 (Proposed Standard) . H. Schulzrinne, A. Rao, and R. Lanphier. Real Time Streaming Protocol (RTSP), april 1998. RFC 2326 (Proposed Standard)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348676.2348682"},{"key":"e_1_3_2_1_42_1","unstructured":"Sprint: Global provider of voice data and Internet services. URL: http:\/\/www.sprint.com\/index_p.html?context=CP.  Sprint: Global provider of voice data and Internet services. URL: http:\/\/www.sprint.com\/index_p.html?context=CP."},{"key":"e_1_3_2_1_43_1","unstructured":"StrongSwan the OpenSource IPsec-based VPN Solution. URL: http:\/\/www.strongswan.org.  StrongSwan the OpenSource IPsec-based VPN Solution. URL: http:\/\/www.strongswan.org."},{"key":"e_1_3_2_1_44_1","unstructured":"Telenor. URL: http:\/\/www.telenor.no\/privat\/.  Telenor. URL: http:\/\/www.telenor.no\/privat\/."},{"key":"e_1_3_2_1_45_1","unstructured":"TheCloud. URL: http:\/\/www.thecloud.net\/.  TheCloud. URL: http:\/\/www.thecloud.net\/."},{"key":"e_1_3_2_1_46_1","unstructured":"VideoLAN. URL: http:\/\/www.videolan.org.  VideoLAN. URL: http:\/\/www.videolan.org."}],"event":{"name":"MSWiM'14: 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal QC Canada","acronym":"MSWiM'14"},"container-title":["Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642687.2642690","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2642687.2642690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:31Z","timestamp":1750231171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642687.2642690"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,21]]},"references-count":46,"alternative-id":["10.1145\/2642687.2642690","10.1145\/2642687"],"URL":"https:\/\/doi.org\/10.1145\/2642687.2642690","relation":{},"subject":[],"published":{"date-parts":[[2014,9,21]]},"assertion":[{"value":"2014-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}