Authentication and ID-Based Key Management Protocol in Pervasive Environment

被引:0
作者
Jong Sik Moon
Jong Hyuk Park
Deok Gyu Lee
Im-Yeong Lee
机构
[1] Soonchunhyang University,Division of Computer Science and Engineering
[2] Kyungnam University,Department of Computer Science and Engineering
[3] Electronics and Telecommunications Research Institute,undefined
来源
Wireless Personal Communications | 2010年 / 55卷
关键词
Authentication; ID-based; Key management; Pervasive;
D O I
暂无
中图分类号
学科分类号
摘要
The combination of wired and wireless technologies is spreading rapidly with the advance of Internet and networks, since it enables the creation of new services, and provides new features to both users and service providers. In such wired and wireless integrated services, network integration is very important, because such systems involve linking heterogeneous networks; and they involve integrating transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable, since network integration involves heterogeneous networks. The network may have several security vulnerabilities. Also, the available services are for roaming users. In these services, we must provide fast authentication and security for roaming. Therefore, in this paper we proposed authentication and ID-based key management in pervasive environments. Our system provides efficient, secure communication.
引用
收藏
页码:91 / 103
页数:12
相关论文
共 22 条
[1]  
Yang D. H.(2004)Fixed and mobile service convergence and reconfiguration of telecommunications value chains IEEE Wireless Communications 11 42-47
[2]  
Kim S. C.(2005)On the International Standardization of AAA Technology Etri Trend 20 123-129
[3]  
Nam C. G.(2006)Integrated authentication and key management method among heterogeneous wireless mobile networks IEEK 43 50-59
[4]  
Moon J. S.(2009)An improved identity-based key agreement protocol and its security proof ISCI 179 307-318
[5]  
Kim H. G.(2005)A scalable authentication framework for fast remote roaming with hierarchical caching Korean Institute of Information Scientists and Engineers 32 561-573
[6]  
Lee B. G.(undefined)undefined undefined undefined undefined-undefined
[7]  
Choi D. H.(undefined)undefined undefined undefined undefined-undefined
[8]  
Yoo S. K.(undefined)undefined undefined undefined undefined-undefined
[9]  
Kim M. H.(undefined)undefined undefined undefined undefined-undefined
[10]  
Lee H. D.(undefined)undefined undefined undefined undefined-undefined