A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments 


Vol. 35,  No. 5, pp. 840-848, May  2010


PDF
  Abstract

This paper proposes a proactive authentication scheme using credentials based on chameleon hashing in MIH environments. There is a proactive authentication structure defined by IEEE 802.21 Security Study Group for the link access in MIH environment. Both schemes based on EAP and on PKI can be applied to such structure, but the former has caused network traffic due to the complicated authentication procedure and the latter has complex structure for managing certificates. The proposed scheme performs the proactive authentication procedure only between a mobile node and a MIH Key Holder by using credentials based on chameleon hashing. Our scheme reduces the network traffic since authentication with the server is unnecessary in MIH environment and PKI structure is not required as well. In addition, the proposed scheme provides secure PFS and PBS features owing to the authenticated Diffie-Hellman key exchange of the chameleon-based credential.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

K. Chae, J. Choi, S. Jung, "A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 5, pp. 840-848, 2010. DOI: .

[ACM Style]

Kangsuk Chae, Jaeduck Choi, and Souhwan Jung. 2010. A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments. The Journal of Korean Institute of Communications and Information Sciences, 35, 5, (2010), 840-848. DOI: .

[KICS Style]

Kangsuk Chae, Jaeduck Choi, Souhwan Jung, "A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 5, pp. 840-848, 5. 2010.