Abstract
The combination of wired and wireless technologies is spreading rapidly with the advance of Internet and networks, since it enables the creation of new services, and provides new features to both users and service providers. In such wired and wireless integrated services, network integration is very important, because such systems involve linking heterogeneous networks; and they involve integrating transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable, since network integration involves heterogeneous networks. The network may have several security vulnerabilities. Also, the available services are for roaming users. In these services, we must provide fast authentication and security for roaming. Therefore, in this paper we proposed authentication and ID-based key management in pervasive environments. Our system provides efficient, secure communication.
Similar content being viewed by others
References
Kim, B. J. (2001). The Technological Trend of Next Generation Authentication Protocol DIAMETER AAA, Telecommunication Technology Association Technology Standards Issue.
Lloyd, B. (1992). William Allen Simpson, PPP Authentication Protocols, RFC 1334.
Yang D. H., Kim S. C., Nam C. G., Moon J. S. (2004) Fixed and mobile service convergence and reconfiguration of telecommunications value chains. IEEE Wireless Communications 11(5): 42–47
Kim H. G., Lee B. G., Choi D. H., Yoo S. K., Kim M. H., Lee H. D., Yoo H. J. (2005) On the International Standardization of AAA Technology. Etri Trend 20(1): 123–129
Park H. S., Lee H. W., Lee D. H. (2006) Integrated authentication and key management method among heterogeneous wireless mobile networks. IEEK 43(7): 50–59
Vollbrecht, J., Calhoun, P., Farrell, S., Gommans, L., Gross, G. de Bruihjn, B., et al. (2000). AAA Authorization Framework, RFC 2904.
Shamir, A. (1984). Identity-based cryptosystems and signature schemes, CRYPTO’84, pp. 47–53.
Wang, H., Yao, G., & Jiang, Q. (2008). An identity-based group key agreement protocol from pairing, The 2008 Third International Conference on Availability, Reliability, Security (ARES), pp. 532–537.
Wang S., Cao Z., Choo K.-K. R., Wang L. (2009) An improved identity-based key agreement protocol and its security proof. ISCI 179(3): 307–318
Lee H. J., Song Y. K., Rhee M. S., Kim C. K. (2005) A scalable authentication framework for fast remote roaming with hierarchical caching. Korean Institute of Information Scientists and Engineers 32(5): 561–573
Kim, G. Y., Lee, C. U., Park, S. H., Song, O. Y., & Jung, B. H. (2002). A Study on Mobile Commerce AAA Mechanism for Wireless LAN, HSI 2003, pp. 719–724.
Jiang, J., He, C., & Jiang, L.-G. (2005). On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access. ICCNMC, pp. 972–981.
IEEE P802.21/D7.1, (2007). Draft Standard for Local and Metropolitan Area Networks: Media Independent Handover Services.
Author information
Authors and Affiliations
Corresponding author
Additional information
This research was financially supported by the Ministry of Education, Science Technology (MEST) and Korea Industrial Technology Foundation (KOTEF) through the Human Resource Training Project for Regional Innovation.
Rights and permissions
About this article
Cite this article
Moon, J.S., Park, J.H., Lee, D.G. et al. Authentication and ID-Based Key Management Protocol in Pervasive Environment. Wireless Pers Commun 55, 91–103 (2010). https://doi.org/10.1007/s11277-009-9788-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-009-9788-y