A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ciou, Yi-Fu | - |
dc.contributor.author | Leu, Fang-Yie | - |
dc.contributor.author | Huang, Yi-Li | - |
dc.contributor.author | Yim, Kangbin | - |
dc.date.accessioned | 2021-08-12T06:47:24Z | - |
dc.date.available | 2021-08-12T06:47:24Z | - |
dc.date.issued | 2011 | - |
dc.identifier.issn | 1574-017X | - |
dc.identifier.issn | 1875-905X | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/17362 | - |
dc.description.abstract | In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short), improving its key generation flow and adding a handover authentication scheme to respectively speed up the handover process and increase the security level for mobile stations (MSs). AAA server supported authentication is also enhanced by invoking an improved extensible authentication protocol (EAP). According to the analyses of this study, the HaKMA can effectively and efficiently provide user authentication, and balance data security and system performance during handover. | - |
dc.format.extent | 29 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | IOS Press | - |
dc.title | A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks | - |
dc.type | Article | - |
dc.publisher.location | 영국 | - |
dc.identifier.doi | 10.1155/2011/408103 | - |
dc.identifier.scopusid | 2-s2.0-80052619430 | - |
dc.identifier.wosid | 000295910000006 | - |
dc.identifier.bibliographicCitation | Mobile Information Systems, v.7, no.3, pp 241 - 269 | - |
dc.citation.title | Mobile Information Systems | - |
dc.citation.volume | 7 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 241 | - |
dc.citation.endPage | 269 | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | AUTHENTICATION | - |
dc.subject.keywordPlus | MANAGEMENT | - |
dc.subject.keywordPlus | MOBILITY | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordPlus | DESIGN | - |
dc.subject.keywordAuthor | HaKMA | - |
dc.subject.keywordAuthor | DiHam | - |
dc.subject.keywordAuthor | PKM | - |
dc.subject.keywordAuthor | WiMax | - |
dc.subject.keywordAuthor | IEEE802.16 | - |
dc.subject.keywordAuthor | wireless security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.