Abstract:
A method, a correspondent node and a mobile node provide anonymity and unlinkability to a mobile node in a session with a correspondent node. Sequence values, calculated based on secret data, are added to updates sent from the mobile node towards the correspondent node and are used by the correspondent node to authenticate updates from the mobile node. A home address of the mobile node is not explicitly disclosed. An expected care-of address is calculated at the correspondent node and used by the correspondent node to send data packets to the mobile node.
Abstract:
Reduction of overhead normally caused by the addition of a second IP header in case of tunneling between a home agent and a mobile node located in a foreign network is achieved by replacing an encapsulated first IP header by a tunnel identifier. The home agent and the mobile node agree on a tunnel identifier value at the time of binding update and acknowledgement. The tunnel identifier may be used independently at the home agent and at the mobile node to reconstruct the first IP header, which identifies a correspondent node. Because the encapsulated first IP header is not terminated at either of the home agent or mobile node, overhead reduction is not impacted by eventual transmission error or loss between these two nodes.
Abstract:
A method for revoking a binding from a mobile node, having a least one binding, comprises providing a target binding with the binding revocation message, so that after the revocation, the mobile node can be reached through the target binding.
Abstract:
A method, a proxy and a host are provided for securing neighbor discovery (ND) signaling between hosts when the hosts are connected through the proxy. A first host sends an original ND message comprising a first signature based on an address of the first host. The proxy removes the address of the first host and substitutes its own address in a modified ND message. The proxy then places a copy of the address of the first host in a new field and builds a proxy signature based on the own address of the proxy and on the new field. The new field and the proxy signature are added to the modified ND message. A second host receives the modified ND message from the proxy and verifies the proxy signature. The second host reconstructs the original ND message content and then verifies the first signature.
Abstract:
Devices, systems, methods and software are described which provide identity assignment and redistribution capabilities for software components of a distributed application. Identity value ranges can be fixed or variable. Identity assignment schemes according to exemplary embodiments facilitate the continuation of traffic between the components and clients during redistribution of the identities.
Abstract:
A method, a proxy and a host are provided for securing neighbor discovery (ND) signaling between hosts when the hosts are connected through the proxy. A first host sends an original ND message comprising a first signature based on an address of the first host. The proxy removes the address of the first host and substitutes its own address in a modified ND message. The proxy then places a copy of the address of the first host in a new field and builds a proxy signature based on the own address of the proxy and on the new field. The new field and the proxy signature are added to the modified ND message. A second host receives the modified ND message from the proxy and verifies the proxy signature. The second host reconstructs the original ND message content and then verifies the first signature.