Abstract
The high-speed transfer rate and various services of the wired network have been combined with the convenience and mobility of wireless networks. This era of combined wire/wireless is being disseminated by new technology that creates new service applications and brings changes to both users and service providers. Network integration is a very important in this wire/wireless service, it is integrated by the convergence between heterogeneous networks and the integration of transmission technologies across networks. In this situation, existing security and communication technologies are difficult to apply due to the need to integrate with heterogeneous networks. Network security has many vulnerabilities. In existing homogeneous networks, user authentication and key management between heterogeneous networks are needed to be adapted to new technology. The establishment of security technologies to heterogeneous devices is also crucial between homogeneous networks. In this paper, we propose secure, efficient key management in a heterogeneous network environment. Therefore, it provides secure communication between heterogeneous network devices.
Similar content being viewed by others
References
Yang D-H, Kim S, Nam C, Moon J-S (2004) Fixed and mobile service convergence and reconfiguration of telecommunications value chains. IEEE Wirel Commun 11(5):42–47
Han H, Huang K, Liu G (2008) CPK and ECC-based authentication and key agreement scheme for heterogeneous wireless network. In: CSSE, pp 1015–1019
Jeong J, Chung MY, Choo H (2008) Integrated OTP-based user authentication scheme using smart cards in home networks. In: HICSS, pp 294
Lee S (2004) ID based wireless LAN authentication technique between terminals. MS Thesis, Kyungpook National University Graduate School
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: CRYPTO’84, pp 47–53
IP Security Protocol (IPSec). IETF. http://www.ietf.org/html.charters/
Tschofenig H, Kroeselberg D, Pashalidis A, Ohba Y, Bersani F (2008) The extensible authentication protocol-Internet key exchange protocol version 2 (EAP-IKEv2) method, RFC 5106
Lim S, Park Y (2003) A study for internet key management protocols: IKE/IKEv2. In: KIISE conference 2003, vol 30, no 2, pp 727–729
Kim H (2003) A study on the key management protocols for IPSEC. MS Thesis, Dong-eui University
Jiang J, He C, Jiang L-G (2005) On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access. In: ICCNMC, pp 972–981
Torres J, Izquierdo A, Ribagorda A, Alcaide A (2005) Secure electronic payments in heterogeneous networking: new authentication protocols approach. In: ICCSA, pp 729–738
Pagliusi PS, Mitchell CJ (2003) PANA/IKEv2: an Internet authentication protocol for heterogeneous access. In: WISA, pp 135–149
Moon J, Lee I, Ahn J (2007) A study on authentication/authorization technology using sub device ticket in ubiquitous home network environment. In: Conference on information security and cryptology—summer, pp 162–165
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Moon, J.S., Park, J.H. & Lee, IY. Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network. J Supercomput 55, 155–172 (2011). https://doi.org/10.1007/s11227-010-0411-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-010-0411-5