Skip to Main Content
IPv6 Advanced Protocols Implementation
book

IPv6 Advanced Protocols Implementation

by Qing Li, Jinmei Tatuya, Keiichi Shima
July 2010
Intermediate to advanced content levelIntermediate to advanced
1008 pages
35h 43m
English
Morgan Kaufmann
Content preview from IPv6 Advanced Protocols Implementation
526 Chapter 5—Mobile IPv6
case, we need to check only one of them. The procedure when returning to home is discussed
in Section 5.5.7.
A mobile node computes a hash value using the secret information computed above. The
algorithm is as follows:
Mobility Data = the care-of address of a mobile node
| the address of a correspondent node
| the Mobility Header message
Authenticator = First(96, HMAC_SHA1(K
bm
, Mobility Data))
where,
| denotes concatenation of data,
the Mobility Header message is either a Binding Update
or a Binding Acknowledgment message,
First(x, y) function returns the first x bits from y,
HMAC_SHA1(key , data) computes a HMAC SHA-1 hash value
against data using key as a key.
The hash value is called an Authenticator. The original data ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

IPv6 Core Protocols Implementation

IPv6 Core Protocols Implementation

Qing Li, Tatuya Jinmei, Keiichi Shima
IPv6 Security

IPv6 Security

Scott Hogg, Eric Vyncke
IPv6 for Enterprise Networks

IPv6 for Enterprise Networks

Shannon McFarland, Muninder Sambi, Nikhil Sharma, Sanjay Hooda
IPv6 Network Programming

IPv6 Network Programming

Jun-ichiro itojun Hagino

Publisher Resources

ISBN: 9780080489308