
ACKNOWLEDGEMENTS
The authors would like to thank the reviewer Mr.
Salim Ferraz who has produced detailed reviews and
much helped to produce this paper.
REFERENCES
Berners-Lee, T. Fielding, R. & Masinter, L. (1998).
Uniform Resource Identifiers (URI): Generic Syntax,
IETF, RFC 2396.
Croft, B. & Gilmore, J. (1985). BOOTSTRAP PROTOCOL
(BOOTP), IETF, RFC 951.
DelRey, M (1981). INTERNET PROTOCOL, IETF, RFC
791.
Demejian, J., Tastet, F., & Serhrouchni, A. (2003). Why
certificates don’t meet e-business needs?. In
SSGRR’03W, International Conference on Advances
in infrastructure for e-Electronic, e-Business, e-
Education, e-Science, e-Medicine on the Internet.
SSGRR Conference, 2003, pp 58.
Demerjian, J. & Serhrouchni, A. (2004). DHCP
authentication using certificates. In SEC’04, 19th IFIP
International Information Security Conference. SEC
Conference, 2004.
Droms, R. & Arbaugh, W. (2001). Authentication for
DHCP Messages, IETF, RFC 3118.
Droms, R. (1997a). Dynamic Host Configuration
Protocol, IETF, RFC 2131.
Droms, R. & Alexander, S. (1997b). DHCP Options and
BOOTP Vendor Extensions, IETF, RFC 2132.
Droms, R. (1999). Procedure for Defining New DHCP
Options, IETF, RFC 2489.
Farrell, S. & Housley (2002), R., An Internet Attribute
Certificate Profile for Authorization, IETF, RFC 3281.
Freier, A. and al., 1996. The SSL Protocol, Version 3.0,
Netscape Communications Corp. Standards
Information Base, The Open Group.
Glazer, G., Hussey, C & Shea, R. (2003). Certificate-
Based Authentication for DHCP [Electronic version].
Retrieved March 20, 2003, from UCLA university,
Computer Science Department Web site:
http://www.cs.ucla.edu/~chussey/proj/dhcp_cert/cbda.
pdf
Hornstein and al., 2000. DHCP Authentication via
Kerberos V, IETF, Internet Draft.
ISC: Internet Software Consortium. Dynamic Host
Configuration Protocol Distribution. Retrieved
February 06, 2004, from
http://www.isc.org/index.pl?/sw/dhcp/
ITU-T Recommendation X.509, 1997. Information
technology-Open Systems Interconnection-The
Directory: Authentication framework.
ITU-T Recommendation X.509, 2000. Information
technology-Open Systems Interconnection-The
Directory: Public-key and attribute certificate
frameworks.
Jonsson, J. & Kaliski, B. (2003). Public-Key
Cryptography Standards (PKCS) #1: RSA
Cryptography Specifications Version 2.1, IETF, RFC
3447.
Kent, S. & Atkinson, R. (1998). Security Architecture for
the Internet Protocol, IETF, RFC 2401.
Komori, T., & Saito, T. (2002). The secure DHCP System
with User Authentication. In LCN’02, 27
th
Annual
IEEE Conference on Local Computer Networks. LCN
Conference, 2002, pp 0123.
Lemon, T. & S. Cheshire (2002), Encoding Long Options
in the Dynamic Host Configuration Protocol
(DHCPv4), IETF, RFC 3396.
Maughan, D. Schertler, M., Schneider, M. & Turner, J.
(1998). Internet Security Association and Key
Management Protocol (ISAKMP), IETF, RFC 2408.
Perkins, C., & Luo, K. (1995). Using DHCP with
computers that move. In Wireless Networks, 1995,
Volume 1, No. III, pp 341-354.
Postel, J. (1980). User Datagram Protocol, IETF, RFC
768.
Tominaga, A., Nakamura. O., Teraoka. F., & Murai. J.
(1995). Problems and solutions of DHCP. In INET'95,
The 5th Annual Conference of the Internet Society.
INET Conference, 1995.
ICETE 2004 - SECURITY AND RELIABILITY IN INFORMATION SYSTEMS AND NETWORKS
106