Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vesa Torvinen is active.

Publication


Featured researches published by Vesa Torvinen.


international conference on information security | 2004

Re-thinking security in IP based micro-mobility

Jukka Ylitalo; Jan Melén; Pekka Nikander; Vesa Torvinen

Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure micro-mobility architecture that scales well between administrative domains, which are already using different kind of network access authentication techniques. The trust between the mobile nodes and middle boxes is established using one-way hash chains and a technique known as secret splitting. Our protocol protects the middle-boxes from traffic re-direction and related Denial-of-Service attacks. The hierarchical scheme supports signaling optimization and secure fast hand-offs. The implementation and simulation results are based on an enhanced version of Host Identity Protocol (HIP). To our knowledge, our micro-mobility protocol is the first one-and-half round-trip protocol that establishes simultaneously a trust relationship between a mobile node and an anchor point, and updates address bindings at the anchor point and at a peer node in a secure way.


communications and multimedia security | 2005

Weak Context Establishment Procedure for Mobility and Multi-Homing Management

Vesa Torvinen; Jukka Ylitalo

Trust establishment seems to be the most difficult problem in mobility and multi-homing management. Many protocol proposals assume the presence of some security infrastructure (e.g. a Public-Key Infrastructure). However, building such a global infrastructure has not taken place, maybe because it would be too expensive and difficult to deploy. In this paper, we introduce a security context establishment procedure that utilizes reverse hash chains, and does not require pre-existing security information. The procedure is known to be vulnerable to an active Man-in-the-Middle attack in the first message exchange, however, the procedure is efficient, and does not have inherent scalability problems.


Archive | 2005

User authentication and authorisation in a communications system

Vesa Torvinen; Vesa Lehtovirta; Monica Wifvesson


Archive | 2005

Secure network/service access

Vesa Torvinen; Bengt Sahlin; Jani Hautakorpi


RFC | 2005

Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) Version-2

Vesa Torvinen; Jari Arkko; Mats Näslund


Archive | 2004

Method for distributing passwords

Vesa Torvinen; Monica Wifvesson; Alfredo Gonzalez Plaza


Archive | 2004

NAT and firewall traversal for HIP

Hannes Tschofenig; Aarthi Nagarajan; Vesa Torvinen; Jukka Ylitalo; Murugaraj Shanmugam


Archive | 2015

METHODS AND ARRANGEMENTS FOR AUTHENTICATING A COMMUNICATION DEVICE

Mats Näslund; Elena Dubrova; Karl Norrman; Vesa Torvinen


Archive | 2018

SÉCURITÉ DE CHIFFREMENT ET PROTECTION DE L’INTÉGRITÉ

Vesa Torvinen; Monica Wifvesson; Mikael Wass; Nicklas Johansson; Atle Monrad; Gang Ren


Archive | 2016

5G-ENSURE - D2.1 Use Cases

Mats Nasland; Goran Selander; Stephen Phillips; Bassem Nasser; Vesa Torvinen; Vesa Lehtovirta; Felix Klaedtke; Seppo Heikkinen; Tommi Pernila; Alexander Zahariev; Ghada Arfaoui; Jose Sanchez; Jean-Philippe Wary; Piers O'Hanlon; Martin Svensson; Rosario Giustolisi; Gorka Lendrino; Carla Salas; Madalina Baltatu; Luciana Costa; Janne Vehkaperä; Olli Mämmelä; Jani Suomalainen

Collaboration


Dive into the Vesa Torvinen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jani Suomalainen

VTT Technical Research Centre of Finland

View shared research outputs
Top Co-Authors

Avatar

Janne Vehkaperä

VTT Technical Research Centre of Finland

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge