Authentication and ID-Based Key Management Protocol in Pervasive Environment

  • Authors:
  • Jong Sik Moon;Jong Hyuk Park;Deok Gyu Lee;Im-Yeong Lee

  • Affiliations:
  • Division of Computer Science and Engineering, Soonchunhyang University, Asan-si, Chungcheongnam-do, Korea 336-745;Department of Computer Science and Engineering, Kyungnam University, Masan-si, Gyeongsangnam-do, Korea 631-701;Electronics and Telecommunications Research Institute, Daejeon, Chungcheongnam-do, Korea 305-700;Division of Computer Science and Engineering, Soonchunhyang University, Asan-si, Chungcheongnam-do, Korea 336-745

  • Venue:
  • Wireless Personal Communications: An International Journal
  • Year:
  • 2010

Quantified Score

Hi-index 0.02

Visualization

Abstract

The combination of wired and wireless technologies is spreading rapidly with the advance of Internet and networks, since it enables the creation of new services, and provides new features to both users and service providers. In such wired and wireless integrated services, network integration is very important, because such systems involve linking heterogeneous networks; and they involve integrating transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable, since network integration involves heterogeneous networks. The network may have several security vulnerabilities. Also, the available services are for roaming users. In these services, we must provide fast authentication and security for roaming. Therefore, in this paper we proposed authentication and ID-based key management in pervasive environments. Our system provides efficient, secure communication.