A public key based PMIPv6 authentication scheme

Jaehyu Kim, Jooseok Song

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

With the proliferation of mobile devices, mobility management has been one of critical research issues. To make high quality mobility management protocol, PMIPv6 is developed. However, to use PMIPv6 widely in the real world, security issues must also be considered. Authentication is the most basic solution to protect many security threats, but detailed authentication procedure is not specified in the PMIPv6 standard document. So, many researchers have proposed their own authentication schemes. Most of these schemes assume that there is only one PMIPv6 domain. Recently, inter-PMIPv6-domain handover schemes, which consider multiple domain environments, were devised to enable PMIPv6 to cover much larger area, but little research has been done about authentication procedure of inter-domain handover. In this paper, we propose a public key based PMIPv6 authentication scheme. According to our analysis, proposed scheme shows better performance than other previous works.

Original languageEnglish
Title of host publication2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings
EditorsWenai Song, Simon Xu, Lichao Chen, Yan Han, Roger Lee
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages5-10
Number of pages6
ISBN (Electronic)9781479948604
DOIs
Publication statusPublished - 2014 Sep 26
Event2014 13th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2014 - Proceedings - Taiyuan, China
Duration: 2014 Jun 42014 Jun 6

Publication series

Name2014 IEEE/ACIS 13th International Conference on Computer and Information Science, ICIS 2014 - Proceedings

Other

Other2014 13th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2014 - Proceedings
CountryChina
CityTaiyuan
Period14/6/414/6/6

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Science Applications

Fingerprint Dive into the research topics of 'A public key based PMIPv6 authentication scheme'. Together they form a unique fingerprint.

Cite this