메뉴 건너뛰기




Volumn 230, Issue , 2013, Pages 64-77

HOTA: Handover optimized ticket-based authentication in network-based mobility management

Author keywords

BAN logic; Handover authentication; Ticket based authentication

Indexed keywords

ACCESS NETWORK; AUTHENTICATION ANALYSIS; AUTHENTICATION SERVERS; BAN LOGIC; HANDOVER; HANDOVER AUTHENTICATIONS; HANDOVER FAILURE PROBABILITIES; HANDOVER LATENCY; HOST-BASED; MOBILE NODES; MOBILITY MANAGEMENT PROTOCOL; MOBILITY SERVICE; NETWORK-BASED MOBILITY MANAGEMENT; PROXY MOBILE IPV6 (PMIPV6); SECURITY AND PERFORMANCE;

EID: 84874108902     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2012.11.006     Document Type: Article
Times cited : (27)

References (28)
  • 3
    • 84862871527 scopus 로고    scopus 로고
    • Dynamically generate a long-lived private key based on password keystroke features and neural network
    • T.-Y. Chang Dynamically generate a long-lived private key based on password keystroke features and neural network Information Sciences 211 2012 36 47
    • (2012) Information Sciences , vol.211 , pp. 36-47
    • Chang, T.-Y.1
  • 4
    • 77958095782 scopus 로고    scopus 로고
    • A communication-efficient three-party password authenticated key exchange protocol
    • T.-Y. Chang, M.-S. Hwang, and W.-P. Yang A communication-efficient three-party password authenticated key exchange protocol Information Sciences 181 1 2011 217 226
    • (2011) Information Sciences , vol.181 , Issue.1 , pp. 217-226
    • Chang, T.-Y.1    Hwang, M.-S.2    Yang, W.-P.3
  • 5
    • 80053371712 scopus 로고    scopus 로고
    • A lightweight mutual authentication mechanism for network mobility in ieee 802.16e wireless networks
    • M.-C. Chuang, and J.-F. Lee A lightweight mutual authentication mechanism for network mobility in ieee 802.16e wireless networks Computer Networks 55 16 2011 3796 3809
    • (2011) Computer Networks , vol.55 , Issue.16 , pp. 3796-3809
    • Chuang, M.-C.1    Lee, J.-F.2
  • 7
    • 0001636149 scopus 로고    scopus 로고
    • Channel occupancy times and handoff rate for mobile computing and pcs networks
    • Y. Fang, I. Chlamtac, and Y.-B. Lin Channel occupancy times and handoff rate for mobile computing and pcs networks IEEE Transactions on Computer 47 6 1998 679 692
    • (1998) IEEE Transactions on Computer , vol.47 , Issue.6 , pp. 679-692
    • Fang, Y.1    Chlamtac, I.2    Lin, Y.-B.3
  • 12
    • 77954746343 scopus 로고    scopus 로고
    • Cost analysis of IP mobility management protocols for consumer mobile devices
    • J.-H. Lee, T. Ernst, and T.-M. Chung Cost analysis of IP mobility management protocols for consumer mobile devices IEEE Transactions on Consumer Electronics 56 2 2010 1010 1017
    • (2010) IEEE Transactions on Consumer Electronics , vol.56 , Issue.2 , pp. 1010-1017
    • Lee, J.-H.1    Ernst, T.2    Chung, T.-M.3
  • 13
    • 67650799167 scopus 로고    scopus 로고
    • A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6
    • J.-H. Lee, Y.-H. Han, S. Gundavelli, and T.-M. Chung A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6 Telecommunication Systems 41 4 2009 279 292
    • (2009) Telecommunication Systems , vol.41 , Issue.4 , pp. 279-292
    • Lee, J.-H.1    Han, Y.-H.2    Gundavelli, S.3    Chung, T.-M.4
  • 15
    • 77950306152 scopus 로고    scopus 로고
    • Enabling a paging mechanism in network-based localized mobility management networks
    • J.-H. Lee, S. Pack, I. You, and T.-M. Chung Enabling a paging mechanism in network-based localized mobility management networks Journal of Internet Technology 10 5 2009 463 472
    • (2009) Journal of Internet Technology , vol.10 , Issue.5 , pp. 463-472
    • Lee, J.-H.1    Pack, S.2    You, I.3    Chung, T.-M.4
  • 16
    • 78651404109 scopus 로고    scopus 로고
    • A fast iterative localized re-authentication protocol for heterogeneous mobile networks
    • S.-H. Lin, J.-H. Chiu, and G.-R. Lee A fast iterative localized re-authentication protocol for heterogeneous mobile networks IEEE Transactions on Consumer Electronics 56 4 2010 2267 2275
    • (2010) IEEE Transactions on Consumer Electronics , vol.56 , Issue.4 , pp. 2267-2275
    • Lin, S.-H.1    Chiu, J.-H.2    Lee, G.-R.3
  • 24
    • 84871920156 scopus 로고    scopus 로고
    • Security Threats to Network-Based Localized Mobility Management (NETLMM)
    • April
    • C. Vogt, J. Kempf, Security Threats to Network-Based Localized Mobility Management (NETLMM), RFC 4832 (Informational), April 2007.
    • (2007) RFC 4832 (Informational)
    • Vogt, C.1    Kempf, J.2
  • 25
    • 43849103766 scopus 로고    scopus 로고
    • Recursive protocol for group-oriented authentication with key distribution
    • T.-C. Wu, T.-T. Huang, C.-L. Hsu, and K.-Y. Tsai Recursive protocol for group-oriented authentication with key distribution Journal of Systems and Software 81 7 2008 1227 1239
    • (2008) Journal of Systems and Software , vol.81 , Issue.7 , pp. 1227-1239
    • Wu, T.-C.1    Huang, T.-T.2    Hsu, C.-L.3    Tsai, K.-Y.4
  • 26
    • 84874111217 scopus 로고    scopus 로고
    • A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs
    • L.-Y. Yeh, C.-C. Yang, J.-G. Chang, and Y.-L. Tsai A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs Journal of Network and Computer Applications 2012
    • (2012) Journal of Network and Computer Applications
    • Yeh, L.-Y.1    Yang, C.-C.2    Chang, J.-G.3    Tsai, Y.-L.4
  • 28
    • 70350215584 scopus 로고    scopus 로고
    • An authentication method for Proxy Mobile IPv6 and performance analysis
    • H. Zhou, H. Zhang, and Y. Qin An authentication method for Proxy Mobile IPv6 and performance analysis Security and Communication Networks 2 5 2009 445 454
    • (2009) Security and Communication Networks , vol.2 , Issue.5 , pp. 445-454
    • Zhou, H.1    Zhang, H.2    Qin, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.