Skip to main content
Log in

Authentication and ID-Based Key Management Protocol in Pervasive Environment

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The combination of wired and wireless technologies is spreading rapidly with the advance of Internet and networks, since it enables the creation of new services, and provides new features to both users and service providers. In such wired and wireless integrated services, network integration is very important, because such systems involve linking heterogeneous networks; and they involve integrating transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable, since network integration involves heterogeneous networks. The network may have several security vulnerabilities. Also, the available services are for roaming users. In these services, we must provide fast authentication and security for roaming. Therefore, in this paper we proposed authentication and ID-based key management in pervasive environments. Our system provides efficient, secure communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Kim, B. J. (2001). The Technological Trend of Next Generation Authentication Protocol DIAMETER AAA, Telecommunication Technology Association Technology Standards Issue.

  2. Lloyd, B. (1992). William Allen Simpson, PPP Authentication Protocols, RFC 1334.

  3. Yang D. H., Kim S. C., Nam C. G., Moon J. S. (2004) Fixed and mobile service convergence and reconfiguration of telecommunications value chains. IEEE Wireless Communications 11(5): 42–47

    Article  Google Scholar 

  4. Kim H. G., Lee B. G., Choi D. H., Yoo S. K., Kim M. H., Lee H. D., Yoo H. J. (2005) On the International Standardization of AAA Technology. Etri Trend 20(1): 123–129

    Google Scholar 

  5. Park H. S., Lee H. W., Lee D. H. (2006) Integrated authentication and key management method among heterogeneous wireless mobile networks. IEEK 43(7): 50–59

    Google Scholar 

  6. Vollbrecht, J., Calhoun, P., Farrell, S., Gommans, L., Gross, G. de Bruihjn, B., et al. (2000). AAA Authorization Framework, RFC 2904.

  7. Shamir, A. (1984). Identity-based cryptosystems and signature schemes, CRYPTO’84, pp. 47–53.

  8. Wang, H., Yao, G., & Jiang, Q. (2008). An identity-based group key agreement protocol from pairing, The 2008 Third International Conference on Availability, Reliability, Security (ARES), pp. 532–537.

  9. Wang S., Cao Z., Choo K.-K. R., Wang L. (2009) An improved identity-based key agreement protocol and its security proof. ISCI 179(3): 307–318

    MATH  MathSciNet  Google Scholar 

  10. Lee H. J., Song Y. K., Rhee M. S., Kim C. K. (2005) A scalable authentication framework for fast remote roaming with hierarchical caching. Korean Institute of Information Scientists and Engineers 32(5): 561–573

    Google Scholar 

  11. Kim, G. Y., Lee, C. U., Park, S. H., Song, O. Y., & Jung, B. H. (2002). A Study on Mobile Commerce AAA Mechanism for Wireless LAN, HSI 2003, pp. 719–724.

  12. Jiang, J., He, C., & Jiang, L.-G. (2005). On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access. ICCNMC, pp. 972–981.

  13. IEEE P802.21/D7.1, (2007). Draft Standard for Local and Metropolitan Area Networks: Media Independent Handover Services.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Im-Yeong Lee.

Additional information

This research was financially supported by the Ministry of Education, Science Technology (MEST) and Korea Industrial Technology Foundation (KOTEF) through the Human Resource Training Project for Regional Innovation.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Moon, J.S., Park, J.H., Lee, D.G. et al. Authentication and ID-Based Key Management Protocol in Pervasive Environment. Wireless Pers Commun 55, 91–103 (2010). https://doi.org/10.1007/s11277-009-9788-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-009-9788-y

Keywords

Navigation