Detailed Information

Cited 0 time in webofscience Cited 6 time in scopus
Metadata Downloads

Adaptive authentication scheme for mobile devices in proxy MIPv6 networks

Authors
You, IlsunLim, Jae DeokKim, Jeong NyeoAhn, HyobeomChoi, Chang
Issue Date
24-Nov-2016
Publisher
Institution of Engineering and Technology
Keywords
IP networks; Internet; mobility management (mobile radio); computer network security; formal verification; adaptive authentication scheme; mobile devices; proxy MIPv6 networks; mobility management; Internet services; Internet networks; proxy mobile IPv6; PMIPv6 network protection; authentication strength; formal security verification
Citation
IET Communications, v.10, no.17, pp 2319 - 2327
Pages
9
Journal Title
IET Communications
Volume
10
Number
17
Start Page
2319
End Page
2327
URI
https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/8596
DOI
10.1049/iet-com.2016.0480
ISSN
1751-8628
1751-8636
Abstract
Mobility management has become a core function in internet services and networks as mobile devices have been widely used and their capabilities have dramatically advanced. It is expected that proxy mobile IPv6 (PMIPv6), which is the most prominent solution, will play an important role in supporting these devices' mobility. To protect PMIPv6 networks, several authentication schemes have been presented. However, due to their static approach, the existing schemes failed to keep a good balance between security and efficiency. Motivated by this, the authors study an adaptive authentication scheme for mobile devices in PMIPv6 networks. In particular, the proposed scheme considers mobile nodes' context information to decide authentication strength, based on which adaptive authentication is performed. It is shown from the formal security verification and the example study that the proposed scheme is not only correct, but also achieves a good trade-off between security and efficiency
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE