Skip to main content

Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network


The high-speed transfer rate and various services of the wired network have been combined with the convenience and mobility of wireless networks. This era of combined wire/wireless is being disseminated by new technology that creates new service applications and brings changes to both users and service providers. Network integration is a very important in this wire/wireless service, it is integrated by the convergence between heterogeneous networks and the integration of transmission technologies across networks. In this situation, existing security and communication technologies are difficult to apply due to the need to integrate with heterogeneous networks. Network security has many vulnerabilities. In existing homogeneous networks, user authentication and key management between heterogeneous networks are needed to be adapted to new technology. The establishment of security technologies to heterogeneous devices is also crucial between homogeneous networks. In this paper, we propose secure, efficient key management in a heterogeneous network environment. Therefore, it provides secure communication between heterogeneous network devices.

This is a preview of subscription content, access via your institution.


  1. Yang D-H, Kim S, Nam C, Moon J-S (2004) Fixed and mobile service convergence and reconfiguration of telecommunications value chains. IEEE Wirel Commun 11(5):42–47

    Article  Google Scholar 

  2. Han H, Huang K, Liu G (2008) CPK and ECC-based authentication and key agreement scheme for heterogeneous wireless network. In: CSSE, pp 1015–1019

  3. Jeong J, Chung MY, Choo H (2008) Integrated OTP-based user authentication scheme using smart cards in home networks. In: HICSS, pp 294

  4. Lee S (2004) ID based wireless LAN authentication technique between terminals. MS Thesis, Kyungpook National University Graduate School

  5. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: CRYPTO’84, pp 47–53

  6. IP Security Protocol (IPSec). IETF.

  7. Tschofenig H, Kroeselberg D, Pashalidis A, Ohba Y, Bersani F (2008) The extensible authentication protocol-Internet key exchange protocol version 2 (EAP-IKEv2) method, RFC 5106

  8. Lim S, Park Y (2003) A study for internet key management protocols: IKE/IKEv2. In: KIISE conference 2003, vol 30, no 2, pp 727–729

  9. Kim H (2003) A study on the key management protocols for IPSEC. MS Thesis, Dong-eui University

  10. Jiang J, He C, Jiang L-G (2005) On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access. In: ICCNMC, pp 972–981

  11. Torres J, Izquierdo A, Ribagorda A, Alcaide A (2005) Secure electronic payments in heterogeneous networking: new authentication protocols approach. In: ICCSA, pp 729–738

  12. Pagliusi PS, Mitchell CJ (2003) PANA/IKEv2: an Internet authentication protocol for heterogeneous access. In: WISA, pp 135–149

  13. Moon J, Lee I, Ahn J (2007) A study on authentication/authorization technology using sub device ticket in ubiquitous home network environment. In: Conference on information security and cryptology—summer, pp 162–165

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Im-Yeong Lee.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Moon, J.S., Park, J.H. & Lee, IY. Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network. J Supercomput 55, 155–172 (2011).

Download citation

  • Published:

  • Issue Date:

  • DOI:


  • Admissible bilinear map
  • Authentication
  • Heterogeneous network
  • ID-based
  • Key management