A Light-weight PKM Mutual Authentication Protocol for Improving Initial Authentication in WiMAX |
Jeong, Yoon-Su
(충북대학교 전자계산학과)
Kim, Yong-Tae (한남대학교 멀티미디어학부) Park, Gil-Cheol (한남대학교 멀티미디어학부) Lee, Sang-Ho (충북대학교 전기전자컴퓨터공학부) |
1 | IEEE 802.16e-2005, 'Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems', 2006 |
2 | D. Johnston and J. Walker, 'Overview of IEEE 802.16 Security', IEEE Security & Privacy, 2004 DOI ScienceOn |
3 | S. Xu and C.-T. Huang, 'Attacks on PKM protocols of IEEE 802.16 and its later versions', Proceedings of the 3rd International Symposium on Wireless Comunication Systems (ISWCS 2006), Sep., 2006 |
4 | IETF RFC 4285, 'Authentication Protocol for Mobile IPv6', 2006 |
5 | S. Xu, M. Mattews and C.-T. Huang, 'Security issues in privacy and key management protocols of IEEE 802.16', Proceedings of the 44th ACM Southeast Conference (ACMSE 2006), Mar., 2006 |
6 | WiMAX Forum NWG, 'Stage-3: Detailed Protocol and Procedures', 2007 |
7 | T. Janevski, 'Traffic analysis and design of wireless IP networks', Artech House, pp.186-190, 2003 |
8 | TTAS.KO-06.0065R1, '2.3GHz 휴대인터넷 표준 메체접근제어 계층', 2004년 |
9 | 김대익, 이상호, 김영진, 'WiBro/Mobile WiMAX 이동성 기술', 한국정보과학회, 제25권, 제4호, 2007년 4월, pp.5-14 과학기술학회마을 |
10 | D. Sweeney, 'WiMax Operator Manual: building 802.16 Wireless Networks', Apress, 2005 |
11 | A. Mishra, M. Shin, and W. Arbaugh, 'pro-active Key Distribution using neighbor Graphs', IEEE Wireless Communication, Vol.11, Feb., 2004 DOI ScienceOn |
12 | KISA, '와이브로 인증, 키 관리 기술동향', 정보보호뉴스, 2006년 6월 |
13 | M. Kassb, A. Belghith, J. M. Bonnin and S. Sassi, 'Fast Pre-Authentication Based on Proactive Key Distribution for 802.11 Infrastructure Networks', In Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling, pp.46-53, 2005 |
14 | D. Johnston and J. Walker, 'Overview of IEEE 802.16 security,' IEEE Security & Privacy, Vol.2, No.3, pp.40-88, May/June, 2004 DOI ScienceOn |
15 | S. Xu, M. M. Matthews, and C.-T. Huang, 'Security issues in privacy and key management protocols of IEEE 802.16,' in ACM Southeast Regional Conference, R. Menezes, Ed. ACM, pp.113-118, 2006 |
16 | M. Barbeau, 'Wimax/802.16 threat analysis,' in Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. New York, NY, USA: ACM Press, pp.8-15, 2005 |
17 | A. Ghosh, D. R. J. Wolter, G. Andrews, and R. Chen, 'Broadband Wireless Access with WiMax/802.16: Current Performance Benchmarks and Future Potential', IEEE Communications Magazines, Vol.43, Issue2, pp.129-136. Feb., 2005 DOI ScienceOn |