Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Yu-Wen | en_US |
dc.contributor.author | Wang, Jui-Tang | en_US |
dc.contributor.author | Chi, Kuang-Hui | en_US |
dc.contributor.author | Tseng, Chien-Chao | en_US |
dc.date.accessioned | 2014-12-08T15:22:03Z | - |
dc.date.available | 2014-12-08T15:22:03Z | - |
dc.date.issued | 2012-02-01 | en_US |
dc.identifier.issn | 0929-6212 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1007/s11277-010-0104-7 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/15645 | - |
dc.description.abstract | This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes require the SN to interact with the HN for authenticating respective MSs, at the cost of repeated message exchanges and communication delay. Instead, in our design, when the first MS of a group visits, the SN performs full authentication with the concerned HN and thereby obtains authentication information for the MS and other members. Thus when any other MS of the same group visits, the SN can authenticate locally without subsequent involvement of the HN, so as to simplify protocol operations. We will show that our scheme does not trade performance for security and robustness to the extent that security requirements are unduly weakened. Both qualitative and quantitative discussions indicate that our proposed scheme lends itself to pragmatic settings. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Wireless network | en_US |
dc.subject | Security | en_US |
dc.subject | Group key | en_US |
dc.subject | Authentication and key agreement | en_US |
dc.subject | Roaming | en_US |
dc.title | Group-Based Authentication and Key Agreement | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1007/s11277-010-0104-7 | en_US |
dc.identifier.journal | WIRELESS PERSONAL COMMUNICATIONS | en_US |
dc.citation.volume | 62 | en_US |
dc.citation.issue | 4 | en_US |
dc.citation.spage | 965 | en_US |
dc.citation.epage | 979 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000301193700014 | - |
dc.citation.woscount | 2 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.