ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article Authentication and ID-Based Key Management Protocol in Pervasive Environment
Cited 6 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Jong Sik Moon, Jong Hyuk Park, Deok Gyu Lee, Im-Yeong Lee
Issue Date
2010-09
Citation
Wireless Personal Communications, v.55, no.1, pp.91-103
ISSN
0929-6212
Publisher
Springer
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.1007/s11277-009-9788-y
Abstract
The combination of wired and wireless technologies is spreading rapidly with the advance of Internet and networks, since it enables the creation of new services, and provides new features to both users and service providers. In such wired and wireless integrated services, network integration is very important, because such systems involve linking heterogeneous networks; and they involve integrating transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable, since network integration involves heterogeneous networks. The network may have several security vulnerabilities. Also, the available services are for roaming users. In these services, we must provide fast authentication and security for roaming. Therefore, in this paperwe proposed authentication and ID-based key management in pervasive environments. Our system provides efficient, secure communication. © Springer Science+Business Media, LLC. 2009.
KSP Keywords
Fast authentication, ID-based, Integrated Services(IntServ), Key Management(KM), Key management protocol, Pervasive Environment, Secure Communication, Security vulnerabilities, Service Provider, Wired and wireless, communication technologies