Detailed Information

Cited 0 time in webofscience Cited 2 time in scopus
Metadata Downloads

An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network

Full metadata record
DC Field Value Language
dc.contributor.authorGao, Tianhan-
dc.contributor.authorTan, Ling-
dc.contributor.authorQiao, Peiyu-
dc.contributor.authorYim, Kangbin-
dc.date.accessioned2021-08-11T18:45:47Z-
dc.date.available2021-08-11T18:45:47Z-
dc.date.issued2016-
dc.identifier.issn1079-8587-
dc.identifier.issn2326-005X-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/9923-
dc.description.abstractProxy Mobile IPv6 (PMIPv6) enables local network-based mobility management for mobile node without being involved with any mobility-related signalling. However, the lack of access authentication makes PMIPv6 more vulnerable. The literature authentication schemes suffer from low efficiency and suitability. This paper presents a novel efficient authentication scheme for PMIPv6 based on a 2-level identity-based signature scheme. A mutual access authentication protocol is then achieved to eliminate the interactions between the home network and the access network for improving authentication efficiency and reducing communication cost. Moreover, the security and performance analysis demonstrate that the proposed scheme is robust and is able to provide better solution than existing ones.-
dc.format.extent8-
dc.language영어-
dc.language.isoENG-
dc.publisherAutoSoft Press-
dc.titleAn Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1080/10798587.2015.1126950-
dc.identifier.scopusid2-s2.0-84955152428-
dc.identifier.wosid000380901000008-
dc.identifier.bibliographicCitationIntelligent Automation and Soft Computing, v.22, no.3, pp 389 - 396-
dc.citation.titleIntelligent Automation and Soft Computing-
dc.citation.volume22-
dc.citation.number3-
dc.citation.startPage389-
dc.citation.endPage396-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaAutomation & Control Systems-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryAutomation & Control Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.subject.keywordAuthorProxy Mobile IPv6-
dc.subject.keywordAuthorAccess authentication-
dc.subject.keywordAuthorHandover authentication-
dc.subject.keywordAuthorHMAC-
dc.subject.keywordAuthorHierarchical identity-based signature scheme-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yim, Kang bin photo

Yim, Kang bin
College of Software Convergence (Department of Information Security Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE