Adaptive authentication scheme for mobile devices in proxy MIPv6 networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | You, Ilsun | - |
dc.contributor.author | Lim, Jae Deok | - |
dc.contributor.author | Kim, Jeong Nyeo | - |
dc.contributor.author | Ahn, Hyobeom | - |
dc.contributor.author | Choi, Chang | - |
dc.date.accessioned | 2021-08-11T16:44:27Z | - |
dc.date.available | 2021-08-11T16:44:27Z | - |
dc.date.issued | 2016-11-24 | - |
dc.identifier.issn | 1751-8628 | - |
dc.identifier.issn | 1751-8636 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/8596 | - |
dc.description.abstract | Mobility management has become a core function in internet services and networks as mobile devices have been widely used and their capabilities have dramatically advanced. It is expected that proxy mobile IPv6 (PMIPv6), which is the most prominent solution, will play an important role in supporting these devices' mobility. To protect PMIPv6 networks, several authentication schemes have been presented. However, due to their static approach, the existing schemes failed to keep a good balance between security and efficiency. Motivated by this, the authors study an adaptive authentication scheme for mobile devices in PMIPv6 networks. In particular, the proposed scheme considers mobile nodes' context information to decide authentication strength, based on which adaptive authentication is performed. It is shown from the formal security verification and the example study that the proposed scheme is not only correct, but also achieves a good trade-off between security and efficiency | - |
dc.format.extent | 9 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institution of Engineering and Technology | - |
dc.title | Adaptive authentication scheme for mobile devices in proxy MIPv6 networks | - |
dc.type | Article | - |
dc.publisher.location | 영국 | - |
dc.identifier.doi | 10.1049/iet-com.2016.0480 | - |
dc.identifier.scopusid | 2-s2.0-84996598326 | - |
dc.identifier.wosid | 000388498700009 | - |
dc.identifier.bibliographicCitation | IET Communications, v.10, no.17, pp 2319 - 2327 | - |
dc.citation.title | IET Communications | - |
dc.citation.volume | 10 | - |
dc.citation.number | 17 | - |
dc.citation.startPage | 2319 | - |
dc.citation.endPage | 2327 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | sci | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | PROTOCOL | - |
dc.subject.keywordAuthor | IP networks | - |
dc.subject.keywordAuthor | Internet | - |
dc.subject.keywordAuthor | mobility management (mobile radio) | - |
dc.subject.keywordAuthor | computer network security | - |
dc.subject.keywordAuthor | formal verification | - |
dc.subject.keywordAuthor | adaptive authentication scheme | - |
dc.subject.keywordAuthor | mobile devices | - |
dc.subject.keywordAuthor | proxy MIPv6 networks | - |
dc.subject.keywordAuthor | mobility management | - |
dc.subject.keywordAuthor | Internet services | - |
dc.subject.keywordAuthor | Internet networks | - |
dc.subject.keywordAuthor | proxy mobile IPv6 | - |
dc.subject.keywordAuthor | PMIPv6 network protection | - |
dc.subject.keywordAuthor | authentication strength | - |
dc.subject.keywordAuthor | formal security verification | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.