A public key based PMIPv6 authentication scheme

Jaehyu Kim, Joo Seok Song

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

With the proliferation of mobile devices, mobility management has been one of critical research issues. To make high quality mobility management protocol, PMIPv6 is developed. However, to use PMIPv6 widely in the real world, security issues must also be considered. Authentication is the most basic solution to protect many security threats, but detailed authentication procedure is not specified in the PMIPv6 standard document. So, many researchers have proposed their own authentication schemes. Most of these schemes assume that there is only one PMIPv6 domain. Recently, inter-PMIPv6-domain handover schemes, which consider multiple domain environments, were devised to enable PMIPv6 to cover much larger area, but little research has been done about authentication procedure of inter-domain handover. In this paper, we propose a public key based PMIPv6 authentication scheme. According to our analysis, proposed scheme shows better performance than other previous works.

Original languageEnglish
Title of host publication2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings
EditorsWenai Song, Simon Xu, Lichao Chen, Yan Han, Roger Lee
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages5-10
Number of pages6
ISBN (Electronic)9781479948604
DOIs
Publication statusPublished - 2014 Sep 26
Event2014 13th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2014 - Proceedings - Taiyuan, China
Duration: 2014 Jun 42014 Jun 6

Publication series

Name2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings

Other

Other2014 13th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2014 - Proceedings
CountryChina
CityTaiyuan
Period14/6/414/6/6

Fingerprint

Authentication
Mobile devices

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Science Applications

Cite this

Kim, J., & Song, J. S. (2014). A public key based PMIPv6 authentication scheme. In W. Song, S. Xu, L. Chen, Y. Han, & R. Lee (Eds.), 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings (pp. 5-10). [6912098] (2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICIS.2014.6912098
Kim, Jaehyu ; Song, Joo Seok. / A public key based PMIPv6 authentication scheme. 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings. editor / Wenai Song ; Simon Xu ; Lichao Chen ; Yan Han ; Roger Lee. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 5-10 (2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings).
@inproceedings{89a3ec730c90413a906da06d24610882,
title = "A public key based PMIPv6 authentication scheme",
abstract = "With the proliferation of mobile devices, mobility management has been one of critical research issues. To make high quality mobility management protocol, PMIPv6 is developed. However, to use PMIPv6 widely in the real world, security issues must also be considered. Authentication is the most basic solution to protect many security threats, but detailed authentication procedure is not specified in the PMIPv6 standard document. So, many researchers have proposed their own authentication schemes. Most of these schemes assume that there is only one PMIPv6 domain. Recently, inter-PMIPv6-domain handover schemes, which consider multiple domain environments, were devised to enable PMIPv6 to cover much larger area, but little research has been done about authentication procedure of inter-domain handover. In this paper, we propose a public key based PMIPv6 authentication scheme. According to our analysis, proposed scheme shows better performance than other previous works.",
author = "Jaehyu Kim and Song, {Joo Seok}",
year = "2014",
month = "9",
day = "26",
doi = "10.1109/ICIS.2014.6912098",
language = "English",
series = "2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "5--10",
editor = "Wenai Song and Simon Xu and Lichao Chen and Yan Han and Roger Lee",
booktitle = "2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings",
address = "United States",

}

Kim, J & Song, JS 2014, A public key based PMIPv6 authentication scheme. in W Song, S Xu, L Chen, Y Han & R Lee (eds), 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings., 6912098, 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings, Institute of Electrical and Electronics Engineers Inc., pp. 5-10, 2014 13th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2014 - Proceedings, Taiyuan, China, 14/6/4. https://doi.org/10.1109/ICIS.2014.6912098

A public key based PMIPv6 authentication scheme. / Kim, Jaehyu; Song, Joo Seok.

2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings. ed. / Wenai Song; Simon Xu; Lichao Chen; Yan Han; Roger Lee. Institute of Electrical and Electronics Engineers Inc., 2014. p. 5-10 6912098 (2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - A public key based PMIPv6 authentication scheme

AU - Kim, Jaehyu

AU - Song, Joo Seok

PY - 2014/9/26

Y1 - 2014/9/26

N2 - With the proliferation of mobile devices, mobility management has been one of critical research issues. To make high quality mobility management protocol, PMIPv6 is developed. However, to use PMIPv6 widely in the real world, security issues must also be considered. Authentication is the most basic solution to protect many security threats, but detailed authentication procedure is not specified in the PMIPv6 standard document. So, many researchers have proposed their own authentication schemes. Most of these schemes assume that there is only one PMIPv6 domain. Recently, inter-PMIPv6-domain handover schemes, which consider multiple domain environments, were devised to enable PMIPv6 to cover much larger area, but little research has been done about authentication procedure of inter-domain handover. In this paper, we propose a public key based PMIPv6 authentication scheme. According to our analysis, proposed scheme shows better performance than other previous works.

AB - With the proliferation of mobile devices, mobility management has been one of critical research issues. To make high quality mobility management protocol, PMIPv6 is developed. However, to use PMIPv6 widely in the real world, security issues must also be considered. Authentication is the most basic solution to protect many security threats, but detailed authentication procedure is not specified in the PMIPv6 standard document. So, many researchers have proposed their own authentication schemes. Most of these schemes assume that there is only one PMIPv6 domain. Recently, inter-PMIPv6-domain handover schemes, which consider multiple domain environments, were devised to enable PMIPv6 to cover much larger area, but little research has been done about authentication procedure of inter-domain handover. In this paper, we propose a public key based PMIPv6 authentication scheme. According to our analysis, proposed scheme shows better performance than other previous works.

UR - http://www.scopus.com/inward/record.url?scp=84936758473&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84936758473&partnerID=8YFLogxK

U2 - 10.1109/ICIS.2014.6912098

DO - 10.1109/ICIS.2014.6912098

M3 - Conference contribution

T3 - 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings

SP - 5

EP - 10

BT - 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings

A2 - Song, Wenai

A2 - Xu, Simon

A2 - Chen, Lichao

A2 - Han, Yan

A2 - Lee, Roger

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Kim J, Song JS. A public key based PMIPv6 authentication scheme. In Song W, Xu S, Chen L, Han Y, Lee R, editors, 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2014. p. 5-10. 6912098. (2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings). https://doi.org/10.1109/ICIS.2014.6912098