An integrated security scheme for ID/locator split architecture of future network.
Ved P. KafleRuidong LiDaisuke InoueHiroaki HaraiPublished in: ICC (2012)
Keyphrases
- network architecture
- application level
- network services
- intrusion detection and prevention
- security architecture
- network management
- computer networks
- network access
- cyber attacks
- security policies
- mobile telecommunications
- data flow
- protection scheme
- protocol stack
- security measures
- future internet
- security threats
- network layer
- traffic load
- access control
- authentication scheme
- security issues
- wireless local area network
- virtual private network
- distributed systems
- communication protocols
- provably secure
- network security
- wireless networks
- ns simulator
- abstraction layer
- intrusion detection