Abstract
The combination of wired and wireless technologies is spreading rapidly with the advance of Internet and networks, since it enables the creation of new services, and provides new features to both users and service providers. In such wired and wireless integrated services, network integration is very important, because such systems involve linking heterogeneous networks; and they involve integrating transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable, since network integration involves heterogeneous networks. The network may have several security vulnerabilities. Also, the available services are for roaming users. In these services, we must provide fast authentication and security for roaming. Therefore, in this paperwe proposed authentication and ID-based key management in pervasive environments. Our system provides efficient, secure communication.
| Original language | English |
|---|---|
| Pages (from-to) | 91-103 |
| Number of pages | 13 |
| Journal | Wireless Personal Communications |
| Volume | 55 |
| Issue number | 1 |
| DOIs | |
| State | Published - Sep 2010 |
Keywords
- Authentication
- ID-based
- Key management
- Pervasivex
Fingerprint
Dive into the research topics of 'Authentication and ID-based key management protocol in pervasive environment'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver