Browse > Article

Session Key Exchange and Authentication Scheme between Communication Members in Ubiquitous Networks  

Roh, Hyo-Sun (School of Electronic Engineering, Soongsil University)
Jung, Sou-Hwan (School of Electronic Engineering, Soongsil University)
Publication Information
Abstract
This paper proposed a session key exchange and authentication scheme on non-interactive key distribution algorithm using a community member's ID in ubiquitous networks. In ubiquitous network environment, User's context-awareness information is collected and used to provide a context-awareness service for someone who need it. However, in ubiquitous network environment, this kind of the Context-awareness information could be abused by a malicious nodes. The proposed scheme using the community member ID provides a session key exchange and mutual authentication between community members, and supports secure data communication. Also, when exchanging the session key and authenticating each other, this scheme reduces communication overhead and authentication delay compared to the AAA server scheme.
Keywords
Ad-hoc;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Jaeduck, R. Hyosun, J. Souhwan, and K. Younghan, 'Support of Context-awareness in Ubiquitous Networks using Smart Packet,' IPSJ SIG 2005, pp. 275-280, 2005
2 M. Maurer and Y. Yacobi, 'A remark on a Non- interactive public-key distribution system,' EUROCRYPT' 92, 1998
3 S. Kent and K Seo, 'Security Architecture for the Internet Protocol,' IETF RFC 4301, December 2005
4 S. Corson and J. Macker, 'Mobile ad-hoc networking (MANET),' IETF RFC 2051, January 1999
5 C. Perkins, E. Belding-Royer and S. Das, 'Ad hoc On-Demand Distance Vector (AODV) Routing,' IETF RFC 3561, July 2003
6 T. Kwon, S. Baek, S. Pack, and Y. Choi, 'AAA for NEMO', IETF Internet Draft, draft-kwon- aaa-nemo-00, January 2006
7 P. Argyroudis and D. O'Mahony, 'Secure routing for mobile ad hoc networks,' Communications surveys & Tutorials, IEEE volume 7, pp. 2-21, 2005
8 D. Simon, B. Aboba and R. Hurst, 'The EAP-TLS Authentication Protocol,' IETF RFC 5216, March 2008
9 C. Siva Ram Murthy and B. S, Manoj, Ad Hoc Wireless Networks Architectures and Protocols, Prentice Hall PTR, New Jersey, 2004
10 K. Namhi, P. Ilkyun, and K. Younghan, 'Ubiquitous zone networking technologies for multi-hop based wireless communications,' IWSOS 2006, LNCS 4124, September 2006   DOI   ScienceOn