메뉴 건너뛰기




Volumn 31, Issue 6, 2012, Pages 741-749

An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network

Author keywords

802.16m; Authentication; Handover; Privacy; WiMAX

Indexed keywords

802.16M; ANALYSIS AND SIMULATION; AUTHENTICATION SCHEME; COMMUNICATION OVERHEADS; FAST HANDOVERS; GROUP KEY; HANDOVER; INTERNATIONAL MOBILE TELECOMMUNICATIONS; INTERNATIONAL TELECOMMUNICATION UNIONS; MOBILE STATION; MUTUAL AUTHENTICATION; PRIVACY PRESERVATION; PRIVACY PRESERVING;

EID: 84865236311     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2012.06.008     Document Type: Article
Times cited : (40)

References (30)
  • 2
    • 85029607281 scopus 로고    scopus 로고
    • AVISPA v1.1, http://www.avispa-project.org/.
    • AVISPA v1.1
  • 5
    • 84862821633 scopus 로고    scopus 로고
    • A simple and robust handover authentication between HeNB and eNB in LTE networks
    • Available online 2 March
    • Cao J, Li H, Ma M, Zhang Y, Lai C. A simple and robust handover authentication between HeNB and eNB in LTE networks. Comput Netw, Available online 2 March 2012.
    • (2012) Comput Netw
    • Cao, J.1    Li, H.2    Ma, M.3    Zhang, Y.4    Lai, C.5
  • 6
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility network
    • C. Chen, D. He, S. Chan, J. Bu, Y. Gao, and R. Fan Lightweight and provably secure user authentication with anonymity for the global mobility network Int J Commun Syst 24 3 Mar. 2011 347 362
    • (2011) Int J Commun Syst , vol.24 , Issue.3 , pp. 347-362
    • Chen, C.1    He, D.2    Chan, S.3    Bu, J.4    Gao, Y.5    Fan, R.6
  • 7
    • 75449110407 scopus 로고    scopus 로고
    • A handover authentication using credentials based on chameleon hashing
    • J. Choi, and S. Jung A handover authentication using credentials based on chameleon hashing IEEE Commun Lett 14 1 Jan. 2010 54 56
    • (2010) IEEE Commun Lett , vol.14 , Issue.1 , pp. 54-56
    • Choi, J.1    Jung, S.2
  • 8
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev, and A. Yao On the security of public key protocols IEEE Trans Inf Theory 29 2 Feb. 1983 198 208
    • (1983) IEEE Trans Inf Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 9
    • 84865272578 scopus 로고    scopus 로고
    • EKMP: An enhanced key management protocol for IEEE 802.16m
    • Cancun, Mexico; Mar.
    • Fu A, Zhang Y, Zhu Z, Feng J. EKMP: an enhanced key management protocol for IEEE 802.16m. In: Proc. WCNC'11. Cancun, Mexico; Mar. 2011. p. 1960-1965.
    • (2011) Proc. WCNC'11 , pp. 1960-1965
    • Fu, A.1    Zhang, Y.2    Zhu, Z.3    Feng, J.4
  • 10
    • 78649983188 scopus 로고    scopus 로고
    • A fast handover authentication mechanism based on ticket for IEEE 802.16m
    • A. Fu, Y. Zhang, Z. Zhu, and X. Liu A fast handover authentication mechanism based on ticket for IEEE 802.16m IEEE Commun Lett 14 12 Dec. 2010 1134 1136
    • (2010) IEEE Commun Lett , vol.14 , Issue.12 , pp. 1134-1136
    • Fu, A.1    Zhang, Y.2    Zhu, Z.3    Liu, X.4
  • 12
    • 69249144890 scopus 로고    scopus 로고
    • KTR: An efficient key management scheme for secure data access control in wireless broadcast services
    • Q. Gu, P. Liu, W.C. Lee, and C.H. Chu KTR: an efficient key management scheme for secure data access control in wireless broadcast services IEEE Trans Depend Secure 6 3 Jul./Sep.; 2009 188 201
    • (2009) IEEE Trans Depend Secure , vol.6 , Issue.3 , pp. 188-201
    • Gu, Q.1    Liu, P.2    Lee, W.C.3    Chu, C.H.4
  • 14
    • 70349560401 scopus 로고    scopus 로고
    • A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture
    • C.M. Huang, and J.W. Li A cluster-chain-based context transfer mechanism for fast basic service set transition in the centralized wireless LAN architecture Wirel Commun Mob Comput 9 10 Oct. 2009 1387 1401
    • (2009) Wirel Commun Mob Comput , vol.9 , Issue.10 , pp. 1387-1401
    • Huang, C.M.1    Li, J.W.2
  • 16
    • 38549176356 scopus 로고    scopus 로고
    • SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography
    • Kim Y, Ren W, Jo JY, Jiang Y, Zheng J. SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography. In: Proc. ICC; 2007, p. 1570-1575.
    • (2007) Proc. ICC , pp. 1570-1575
    • Kim, Y.1    Ren, W.2    Jo, J.Y.3    Jiang, Y.4    Zheng, J.5
  • 17
    • 67349253018 scopus 로고    scopus 로고
    • A strong privacy-preserving against global eavesdropping for ehealth systems
    • X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato A strong privacy-preserving against global eavesdropping for ehealth systems IEEE J Sel Areas Commun 27 4 May 2009 365 378
    • (2009) IEEE J Sel Areas Commun , vol.27 , Issue.4 , pp. 365-378
    • Lin, X.1    Lu, R.2    Shen, X.3    Nemoto, Y.4    Kato, N.5
  • 19
    • 77954429311 scopus 로고    scopus 로고
    • Location privacy against traffic analysis attacks in wireless sensor networks
    • Apr
    • Luo X, Ji X, Park MS. Location privacy against traffic analysis attacks in wireless sensor networks. In: Proc. ICISA 2010; Apr. 2010, p. 1-6.
    • (2010) Proc. ICISA 2010 , pp. 1-6
    • Luo, X.1    Ji, X.2    Park, M.S.3
  • 20
    • 44349195348 scopus 로고    scopus 로고
    • Use of EAP-AKA, IETF HOKEY and AAA mechanisms to provide access and handover security and 3G-802.16M interworking
    • Sept
    • Nakhjiri M. Use of EAP-AKA, IETF HOKEY and AAA mechanisms to provide access and handover security and 3G-802.16M interworking. In: Proc. PIMRC'07; Sept. 2007. p. 1-5.
    • (2007) Proc. PIMRC'07 , pp. 1-5
    • Nakhjiri, M.1
  • 22
    • 58149311082 scopus 로고    scopus 로고
    • Kerberized handover keying: A media-independent handover key management architecture
    • Aug
    • Ohba Y, Das S, Dutta A. Kerberized handover keying: a media-independent handover key management architecture. In: Proc. MobiArch 2007; Aug. 2007.
    • (2007) Proc. MobiArch 2007
    • Ohba, Y.1    Das, S.2    Dutta, A.3
  • 23
    • 4544274584 scopus 로고    scopus 로고
    • Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks
    • C. Politis, K.A. Chew, N. Akhtar, M. Georgiades, R. Tafazolli, and T. Dagiuklas Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks IEEE Wirel Commun 11 4 Aug. 2004 76 88
    • (2004) IEEE Wirel Commun , vol.11 , Issue.4 , pp. 76-88
    • Politis, C.1    Chew, K.A.2    Akhtar, N.3    Georgiades, M.4    Tafazolli, R.5    Dagiuklas, T.6
  • 24
    • 77952423508 scopus 로고    scopus 로고
    • A kerberized architecture for fast re-authentication in heterogeneous wireless networks
    • M.L. Rafa, P.G. Fernando, O. Yoshihiro, B.H. Fernando, and F.G. Antonio A kerberized architecture for fast re-authentication in heterogeneous wireless networks Mob Netw Appl 15 3 2010 392 412
    • (2010) Mob Netw Appl , vol.15 , Issue.3 , pp. 392-412
    • Rafa, M.L.1    Fernando, P.G.2    Yoshihiro, O.3    Fernando, B.H.4    Antonio, F.G.5
  • 25
    • 77955333303 scopus 로고    scopus 로고
    • Analysis of handover key management schemes under IETF perspective
    • M.L. Rafa, O. Yoshihiro, P.G. Fernando, and A.F. Gomez Analysis of handover key management schemes under IETF perspective Comput Stand Interfaces 32 5-6 2010 266 273
    • (2010) Comput Stand Interfaces , vol.32 , Issue.56 , pp. 266-273
    • Rafa, M.L.1    Yoshihiro, O.2    Fernando, P.G.3    Gomez, A.F.4
  • 26
    • 77955229114 scopus 로고    scopus 로고
    • An identity-based security system for user privacy in vehicular ad hoc networks
    • J.Y. Sun, C. Zhang, Y.C. Zhang, and Y. Fang An identity-based security system for user privacy in vehicular ad hoc networks IEEE Trans Parallel Distrib Syst 21 9 Sept. 2010
    • (2010) IEEE Trans Parallel Distrib Syst , vol.21 , Issue.9
    • Sun, J.Y.1    Zhang, C.2    Zhang, Y.C.3    Fang, Y.4
  • 27
    • 33646227667 scopus 로고    scopus 로고
    • Automated security protocol analysis with the AVISPA tool
    • L. Vigan Automated security protocol analysis with the AVISPA tool Electron Notes Theor Comput Sci 155 2006 61 86
    • (2006) Electron Notes Theor Comput Sci , vol.155 , pp. 61-86
    • Vigan, L.1
  • 28
    • 79960862937 scopus 로고    scopus 로고
    • Anonymous communication with network coding against traffic analysis attack
    • Mar
    • Wang J, Wang J, Wu C, Lu K, Gu N. Anonymous communication with network coding against traffic analysis attack. In: Proc. IEEE INFOCOM 2011; Mar. 2011. p. 1008-1016.
    • (2011) Proc. IEEE INFOCOM 2011 , pp. 1008-1016
    • Wang, J.1    Wang, J.2    Wu, C.3    Lu, K.4    Gu, N.5
  • 29
    • 51649098802 scopus 로고    scopus 로고
    • A location privacy preserving authentication scheme in vehicular networks
    • Mar
    • Zhang C, Liu R, Ho PH, Chen A. A location privacy preserving authentication scheme in vehicular networks. In: Proc. WCNC 2008; Mar. 2008. p. 2543-2548.
    • (2008) Proc. WCNC 2008 , pp. 2543-2548
    • Zhang, C.1    Liu, R.2    Ho, P.H.3    Chen, A.4
  • 30
    • 65249105433 scopus 로고    scopus 로고
    • Handover keying and its uses
    • X. Zheng, and B. Sarikaya Handover keying and its uses IEEE Netw 23 2 Mar. 2009 27 34
    • (2009) IEEE Netw , vol.23 , Issue.2 , pp. 27-34
    • Zheng, X.1    Sarikaya, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.