A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gao, Tianhan | - |
dc.contributor.author | Guo, Nan | - |
dc.contributor.author | Yim, Kangbin | - |
dc.date.accessioned | 2021-08-12T01:17:56Z | - |
dc.date.available | 2021-08-12T01:17:56Z | - |
dc.date.issued | 2013-04 | - |
dc.identifier.issn | 1820-0214 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/13788 | - |
dc.description.abstract | Establishing secure access and communications in a hierarchical mobile IPv6 (HMIPv6) network, when a mobile node is roaming into a foreign network, is a challenging task and has so far received little attention. Existing solutions are mainly based on public key infrastructure (PKI) or identity-based cryptography (IBC). However, these solutions suffer from either efficiency or scalability problems. In this paper, we leverage the combination of PKI and certificate-based cryptography and propose a hierarchical security architecture for the HMIPv6 roaming service. Under this architecture, we present a mutual authentication protocol based on a novel cross-certificate and certificate-based signature scheme. Mutual authentication is achieved locally during the mobile node's handover. In addition, we propose a key establishment scheme and integrate it into the authentication protocol which can be utilized to set up a secure channel for subsequent communications after authentication. As far as we know, our approach is the first addressing the security of HMIPv6 networks using such a hybrid approach. In comparison with PKI-based and IBC-based schemes, our solution has better overall performance in terms of authenticated handover latency. | - |
dc.format.extent | 26 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | ComSIS Consortium | - |
dc.title | A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks | - |
dc.type | Article | - |
dc.publisher.location | 세르비아공화국 | - |
dc.identifier.doi | 10.2298/CSIS121114041G | - |
dc.identifier.scopusid | 2-s2.0-84878127172 | - |
dc.identifier.wosid | 000319523900019 | - |
dc.identifier.bibliographicCitation | Computer Science and Information Systems, v.10, no.2, pp 913 - 938 | - |
dc.citation.title | Computer Science and Information Systems | - |
dc.citation.volume | 10 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 913 | - |
dc.citation.endPage | 938 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordPlus | ENCRYPTION | - |
dc.subject.keywordAuthor | hierarchical mobile IPv6 | - |
dc.subject.keywordAuthor | mutual authentication | - |
dc.subject.keywordAuthor | identity-based cryptography | - |
dc.subject.keywordAuthor | certificate-based cryptography | - |
dc.subject.keywordAuthor | cross-certificate | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.