An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gao, Tianhan | - |
dc.contributor.author | Tan, Ling | - |
dc.contributor.author | Qiao, Peiyu | - |
dc.contributor.author | Yim, Kangbin | - |
dc.date.accessioned | 2021-08-11T18:45:47Z | - |
dc.date.available | 2021-08-11T18:45:47Z | - |
dc.date.issued | 2016 | - |
dc.identifier.issn | 1079-8587 | - |
dc.identifier.issn | 2326-005X | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/9923 | - |
dc.description.abstract | Proxy Mobile IPv6 (PMIPv6) enables local network-based mobility management for mobile node without being involved with any mobility-related signalling. However, the lack of access authentication makes PMIPv6 more vulnerable. The literature authentication schemes suffer from low efficiency and suitability. This paper presents a novel efficient authentication scheme for PMIPv6 based on a 2-level identity-based signature scheme. A mutual access authentication protocol is then achieved to eliminate the interactions between the home network and the access network for improving authentication efficiency and reducing communication cost. Moreover, the security and performance analysis demonstrate that the proposed scheme is robust and is able to provide better solution than existing ones. | - |
dc.format.extent | 8 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | AutoSoft Press | - |
dc.title | An Access Authentication Scheme Based on Hierarchical IBS for Proxy Mobile IPV6 Network | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1080/10798587.2015.1126950 | - |
dc.identifier.scopusid | 2-s2.0-84955152428 | - |
dc.identifier.wosid | 000380901000008 | - |
dc.identifier.bibliographicCitation | Intelligent Automation and Soft Computing, v.22, no.3, pp 389 - 396 | - |
dc.citation.title | Intelligent Automation and Soft Computing | - |
dc.citation.volume | 22 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 389 | - |
dc.citation.endPage | 396 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Automation & Control Systems | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Automation & Control Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.subject.keywordAuthor | Proxy Mobile IPv6 | - |
dc.subject.keywordAuthor | Access authentication | - |
dc.subject.keywordAuthor | Handover authentication | - |
dc.subject.keywordAuthor | HMAC | - |
dc.subject.keywordAuthor | Hierarchical identity-based signature scheme | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.