ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article Authentication and ID-Based Key Management Protocol in Pervasive Environment
Cited 6 time in scopus Download 1 time Share share facebook twitter linkedin kakaostory
Authors
문종식, 박종혁, Lee Deok Gyu, 이임영
Issue Date
201009
Source
Wireless Personal Communications, v.55 no.1, pp.91-103
ISSN
0929-6212
Publisher
Springer
DOI
https://dx.doi.org/10.1007/s11277-009-9788-y
Abstract
The combination of wired and wireless technologies is spreading rapidly with the advance of Internet and networks, since it enables the creation of new services, and provides new features to both users and service providers. In such wired and wireless integrated services, network integration is very important, because such systems involve linking heterogeneous networks; and they involve integrating transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable, since network integration involves heterogeneous networks. The network may have several security vulnerabilities. Also, the available services are for roaming users. In these services, we must provide fast authentication and security for roaming. Therefore, in this paperwe proposed authentication and ID-based key management in pervasive environments. Our system provides efficient, secure communication. © Springer Science+Business Media, LLC. 2009.
KSP Keywords
ID-based, Integrated Services(InterServ), Pervasive Environment, Secure Communication, Security vulnerabilities, Service Provider, Wired and wireless, Wireless technology, communication technologies, fast authentication, heterogeneous network(HetNet)