Detailed Information

Cited 0 time in webofscience Cited 6 time in scopus
Metadata Downloads

Adaptive authentication scheme for mobile devices in proxy MIPv6 networks

Full metadata record
DC Field Value Language
dc.contributor.authorYou, Ilsun-
dc.contributor.authorLim, Jae Deok-
dc.contributor.authorKim, Jeong Nyeo-
dc.contributor.authorAhn, Hyobeom-
dc.contributor.authorChoi, Chang-
dc.date.accessioned2021-08-11T16:44:27Z-
dc.date.available2021-08-11T16:44:27Z-
dc.date.issued2016-11-24-
dc.identifier.issn1751-8628-
dc.identifier.issn1751-8636-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/8596-
dc.description.abstractMobility management has become a core function in internet services and networks as mobile devices have been widely used and their capabilities have dramatically advanced. It is expected that proxy mobile IPv6 (PMIPv6), which is the most prominent solution, will play an important role in supporting these devices' mobility. To protect PMIPv6 networks, several authentication schemes have been presented. However, due to their static approach, the existing schemes failed to keep a good balance between security and efficiency. Motivated by this, the authors study an adaptive authentication scheme for mobile devices in PMIPv6 networks. In particular, the proposed scheme considers mobile nodes' context information to decide authentication strength, based on which adaptive authentication is performed. It is shown from the formal security verification and the example study that the proposed scheme is not only correct, but also achieves a good trade-off between security and efficiency-
dc.format.extent9-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitution of Engineering and Technology-
dc.titleAdaptive authentication scheme for mobile devices in proxy MIPv6 networks-
dc.typeArticle-
dc.publisher.location영국-
dc.identifier.doi10.1049/iet-com.2016.0480-
dc.identifier.scopusid2-s2.0-84996598326-
dc.identifier.wosid000388498700009-
dc.identifier.bibliographicCitationIET Communications, v.10, no.17, pp 2319 - 2327-
dc.citation.titleIET Communications-
dc.citation.volume10-
dc.citation.number17-
dc.citation.startPage2319-
dc.citation.endPage2327-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClasssci-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusPROTOCOL-
dc.subject.keywordAuthorIP networks-
dc.subject.keywordAuthorInternet-
dc.subject.keywordAuthormobility management (mobile radio)-
dc.subject.keywordAuthorcomputer network security-
dc.subject.keywordAuthorformal verification-
dc.subject.keywordAuthoradaptive authentication scheme-
dc.subject.keywordAuthormobile devices-
dc.subject.keywordAuthorproxy MIPv6 networks-
dc.subject.keywordAuthormobility management-
dc.subject.keywordAuthorInternet services-
dc.subject.keywordAuthorInternet networks-
dc.subject.keywordAuthorproxy mobile IPv6-
dc.subject.keywordAuthorPMIPv6 network protection-
dc.subject.keywordAuthorauthentication strength-
dc.subject.keywordAuthorformal security verification-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE