Journal of Shanghai Jiaotong University ›› 2014, Vol. 48 ›› Issue (10): 1491-1497.
• Automation Technique, Computer Technology • Previous Articles Next Articles
TANG Hongbo1,TANG Wei1,2,CHEN Long1
Received:2013-12-20
CLC Number:
TANG Hongbo1,TANG Wei1,2,CHEN Long1. A Lightweight Local Authentication Mechanism for Network Mobility in Proxy Mobile IPv6 Network Based on Security Associations[J]. Journal of Shanghai Jiaotong University, 2014, 48(10): 1491-1497.
| [1]IETF RFC 4886. Network mobility support goals and requirements[S].[2]IETF RFC 5213. Proxy mobile IPv6[S].[3]IETF RFC 3963. Network moblity (NEMO) basic support protocol[S].[4]ZHANG Yan, HU Hong lin, Fujise M. 无线网络与移动通信的资源、移动与安全管理[M]. 邱天爽, 唐洪, 张旭秀, 等译. 北京: 电子工业出版社, 2008:285298.[5]Soto I, Bernardos C J, Calderon M, et al. NEMOenabled localized mobility support for internet access in automotive scenarios[J]. IEEE Communications Magazine, 2009, 47(5): 152159.[6]Yan Z, Zhou H, You I. NNEMO: A comprehensive network mobility solution in proxy mobile IPv6 network[J]. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2010, 1(2/3): 5270.[7]Lee J H, Ernst T, Chilamkurti N. Performance analysis of PMIPv6based network mobility for intelligent transportation systems[J]. IEEE Transactions on Vehicular Technology, 2012, 61(1): 7485.[8]Park C, Park J, Wang H, et al. The fast handover scheme for mobile nodes in NEMOenabled PMIPv6[C]∥Proceedings of International Conference on Computational Science and Its Applications (ICCSA). Berlin: ICCSA, 2012: 283296.[9]Fathi H, Shin S H, Kobara K, et al. LRAKEBased AAA for network mobility (NEMO) over wireless links[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(9): 17251737.[10]Lim H J, Kim M, Lee J H, et al. Reducing communication overhead for nested NEMO networks: Roaming authentication and access control structure[J]. IEEE Transactions on Vehicular Technology, 2011, 60(7): 34083423.[11]IETF RFC 5193. Protocol for carrying authentication for network access (PANA) Framework[S].[12]Chuang M C, Lee J F. A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks[J]. Computer Networks, 2011, 55(16): 37963809.[13]FIPS 1801.Secure hash standard[S].[14]Ernst T. MobiWan: NS2 extensions to study mobility in widearea IPv6 networks [EB/OL]. (20020608) [20131203]. http://www.inrialpes.fr/planete /mobiwan. |
| [1] | GUO Fei (郭非), CAO Zhenfu (曹珍富), LIU Zhusen (刘竹森), CAO Nanyuan (曹楠源). A Privacy-Preserving Aggregation and Authentication Scheme Towards Mobile Users in Smart Grid [J]. Journal of Shanghai Jiao Tong University (Science), 2020, 25(1): 37-43. |
| [2] | MIRZAEE Siavash, JIANG Letian *(蒋乐天). Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks [J]. Journal of Shanghai Jiao Tong University (Science), 2019, 24(1): 31-40. |
| [3] | HUANG Jheng-jia1 (黄政嘉), LU Pei-chun2 (卢佩君), JUANG Wen-shenq2* (庄文胜), FAN Chun-i1 (范俊逸), LIN Zheng-yang2 (林政扬), LIN Chun-hung2 (林俊宏). Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 443-447. |
| [4] | CHIEN Hung-yu (简宏宇). Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 436-439. |
| [5] | XIE Qi* (谢 琪), LIU Wen-hao (刘文浩), WANG Sheng-bao (王圣宝),HU Bin (胡 斌), DONG Na (董 娜), YU Xiu-yuan (于秀源). Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 418-424. |
| [6] | LIU Xia (刘 侠), JIANG Ling-ge (蒋铃鸽). A Novel Vertical Handoff Algorithm Based on Fuzzy Logic in Aid of Grey Prediction Theory in Wireless Heterogeneous Networks [J]. J Shanghai Jiaotong Univ Sci, 2012, 17(1): 25-030. |
| [7] | CHIEN Hung-yu (简宏宇), YEH Ming-kuei (叶明贵), WU Tzong-chen (吴宗成), LEE Chin-i (李静怡). Comments on Enhanced Yoking Proof Protocols for Radio Frequency Identification Tags and Tag Groups [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 604-609. |
| [8] | LO Nai-wei (罗乃维), YEH Kuo-hui (叶国晖). Simple Three-Party Password Authenticated Key Exchange Protocol [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 600-603. |
| [9] | Wang L.-B.; Pan J.-X.; Ma C.-S.. Simple and efficient password-based authenticated key exchange protocol [J]. J Shanghai Jiaotong Univ Sci, 2011, 16(4): 459-465. |
| [10] | LIN Zhi-Gao-a, SUN Tan-Feng-a, b , JIANG Xing-Hao-a, b . A Content Level Watermarking Scheme for H.264/AVC Video Authentication in VLC Domain [J]. Journal of Shanghai Jiaotong University, 2011, 45(10): 1531-1535. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||