Detailed Information

Cited 0 time in webofscience Cited 3 time in scopus
Metadata Downloads

A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks

Full metadata record
DC Field Value Language
dc.contributor.authorGao, Tianhan-
dc.contributor.authorGuo, Nan-
dc.contributor.authorYim, Kangbin-
dc.date.accessioned2021-08-12T01:17:56Z-
dc.date.available2021-08-12T01:17:56Z-
dc.date.issued2013-04-
dc.identifier.issn1820-0214-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/13788-
dc.description.abstractEstablishing secure access and communications in a hierarchical mobile IPv6 (HMIPv6) network, when a mobile node is roaming into a foreign network, is a challenging task and has so far received little attention. Existing solutions are mainly based on public key infrastructure (PKI) or identity-based cryptography (IBC). However, these solutions suffer from either efficiency or scalability problems. In this paper, we leverage the combination of PKI and certificate-based cryptography and propose a hierarchical security architecture for the HMIPv6 roaming service. Under this architecture, we present a mutual authentication protocol based on a novel cross-certificate and certificate-based signature scheme. Mutual authentication is achieved locally during the mobile node's handover. In addition, we propose a key establishment scheme and integrate it into the authentication protocol which can be utilized to set up a secure channel for subsequent communications after authentication. As far as we know, our approach is the first addressing the security of HMIPv6 networks using such a hybrid approach. In comparison with PKI-based and IBC-based schemes, our solution has better overall performance in terms of authenticated handover latency.-
dc.format.extent26-
dc.language영어-
dc.language.isoENG-
dc.publisherComSIS Consortium-
dc.titleA Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks-
dc.typeArticle-
dc.publisher.location세르비아공화국-
dc.identifier.doi10.2298/CSIS121114041G-
dc.identifier.scopusid2-s2.0-84878127172-
dc.identifier.wosid000319523900019-
dc.identifier.bibliographicCitationComputer Science and Information Systems, v.10, no.2, pp 913 - 938-
dc.citation.titleComputer Science and Information Systems-
dc.citation.volume10-
dc.citation.number2-
dc.citation.startPage913-
dc.citation.endPage938-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusENCRYPTION-
dc.subject.keywordAuthorhierarchical mobile IPv6-
dc.subject.keywordAuthormutual authentication-
dc.subject.keywordAuthoridentity-based cryptography-
dc.subject.keywordAuthorcertificate-based cryptography-
dc.subject.keywordAuthorcross-certificate-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yim, Kang bin photo

Yim, Kang bin
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE