Authentication and ID-based key management protocol in pervasive environment

Jong Sik Moon, Jong Hyuk Park, Deok Gyu Lee, Im Yeong Lee

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

The combination of wired and wireless technologies is spreading rapidly with the advance of Internet and networks, since it enables the creation of new services, and provides new features to both users and service providers. In such wired and wireless integrated services, network integration is very important, because such systems involve linking heterogeneous networks; and they involve integrating transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable, since network integration involves heterogeneous networks. The network may have several security vulnerabilities. Also, the available services are for roaming users. In these services, we must provide fast authentication and security for roaming. Therefore, in this paperwe proposed authentication and ID-based key management in pervasive environments. Our system provides efficient, secure communication.

Original languageEnglish
Pages (from-to)91-103
Number of pages13
JournalWireless Personal Communications
Volume55
Issue number1
DOIs
StatePublished - Sep 2010

Keywords

  • Authentication
  • ID-based
  • Key management
  • Pervasivex

Fingerprint

Dive into the research topics of 'Authentication and ID-based key management protocol in pervasive environment'. Together they form a unique fingerprint.

Cite this