A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2016-07

AUTHORS

Jianhong Zhou, Maode Ma, Yong Feng, Thuy Ngoc Nguyen

ABSTRACT

Providing secured and seamless service is one of the most important aspects of mobile networks, particularly for mobile WiMAX systems. However, the long delay handover schemes brought by the time-consuming EAP-based authentication may cause service disruption when a mobile WiMAX user moves between the coverage areas of different base stations. In this paper, we propose a handover scheme using symmetric key cryptography and pre-authentication approach to shorten the delay while ensuring high security level for Mobile WiMAX handover. The scheme is proven by BAN logic to achieve the security goals of an authentication scheme. A performance analysis is also carried out to show the effectiveness of this scheme in reducing handover delay and saving computational resources. More... »

PAGES

2734-2751

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s11227-015-1581-y

DOI

http://dx.doi.org/10.1007/s11227-015-1581-y

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1031939206


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Nanyang Technological University", 
          "id": "https://www.grid.ac/institutes/grid.59025.3b", 
          "name": [
            "Chengdu Information Technology of Chinese Academy of Science Co. Ltd, Chengdu, China", 
            "School of Electrical and Electronics Engineering, Nanyang Technological University, Singapore, Singapore"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zhou", 
        "givenName": "Jianhong", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Nanyang Technological University", 
          "id": "https://www.grid.ac/institutes/grid.59025.3b", 
          "name": [
            "School of Electrical and Electronics Engineering, Nanyang Technological University, Singapore, Singapore"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ma", 
        "givenName": "Maode", 
        "id": "sg:person.010607646263.42", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010607646263.42"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Chengdu Institute of Information Technology (China)", 
          "id": "https://www.grid.ac/institutes/grid.464239.e", 
          "name": [
            "Chengdu Information Technology of Chinese Academy of Science Co. Ltd, Chengdu, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Feng", 
        "givenName": "Yong", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Nanyang Technological University", 
          "id": "https://www.grid.ac/institutes/grid.59025.3b", 
          "name": [
            "School of Electrical and Electronics Engineering, Nanyang Technological University, Singapore, Singapore"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Nguyen", 
        "givenName": "Thuy Ngoc", 
        "id": "sg:person.014503457045.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014503457045.37"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/77648.77649", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1028687810"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tvt.2015.2394371", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061822810"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/twc.2012.032712.110659", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061828155"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/aina.2015.182", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093844235"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/securecomm.2005.58", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093852697"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/glocom.2008.ecp.394", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094188662"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccct.2014.7001481", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094776765"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tencon.2007.4428890", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094892464"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/csnt.2014.140", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094921690"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccubea.2015.43", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095603422"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2016-07", 
    "datePublishedReg": "2016-07-01", 
    "description": "Providing secured and seamless service is one of the most important aspects of mobile networks, particularly for mobile WiMAX systems. However, the long delay handover schemes brought by the time-consuming EAP-based authentication may cause service disruption when a mobile WiMAX user moves between the coverage areas of different base stations. In this paper, we propose a handover scheme using symmetric key cryptography and pre-authentication approach to shorten the delay while ensuring high security level for Mobile WiMAX handover. The scheme is proven by BAN logic to achieve the security goals of an authentication scheme. A performance analysis is also carried out to show the effectiveness of this scheme in reducing handover delay and saving computational resources.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1007/s11227-015-1581-y", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isFundedItemOf": [
      {
        "id": "sg:grant.7017680", 
        "type": "MonetaryGrant"
      }
    ], 
    "isPartOf": [
      {
        "id": "sg:journal.1133522", 
        "issn": [
          "0920-8542", 
          "1573-0484"
        ], 
        "name": "The Journal of Supercomputing", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "7", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "72"
      }
    ], 
    "name": "A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks", 
    "pagination": "2734-2751", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "9827027026cb7a7b75e663214c3f05bb6c3a17fdd2c2504c0f8e423ea1d46bae"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s11227-015-1581-y"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1031939206"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s11227-015-1581-y", 
      "https://app.dimensions.ai/details/publication/pub.1031939206"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-10T15:03", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8663_00000522.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "http://link.springer.com/10.1007%2Fs11227-015-1581-y"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11227-015-1581-y'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11227-015-1581-y'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11227-015-1581-y'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11227-015-1581-y'


 

This table displays all metadata directly associated to this object as RDF triples.

116 TRIPLES      21 PREDICATES      37 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s11227-015-1581-y schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N9cef53bce8434bafa164e47a1b880be6
4 schema:citation https://doi.org/10.1109/aina.2015.182
5 https://doi.org/10.1109/csnt.2014.140
6 https://doi.org/10.1109/glocom.2008.ecp.394
7 https://doi.org/10.1109/iccct.2014.7001481
8 https://doi.org/10.1109/iccubea.2015.43
9 https://doi.org/10.1109/securecomm.2005.58
10 https://doi.org/10.1109/tencon.2007.4428890
11 https://doi.org/10.1109/tvt.2015.2394371
12 https://doi.org/10.1109/twc.2012.032712.110659
13 https://doi.org/10.1145/77648.77649
14 schema:datePublished 2016-07
15 schema:datePublishedReg 2016-07-01
16 schema:description Providing secured and seamless service is one of the most important aspects of mobile networks, particularly for mobile WiMAX systems. However, the long delay handover schemes brought by the time-consuming EAP-based authentication may cause service disruption when a mobile WiMAX user moves between the coverage areas of different base stations. In this paper, we propose a handover scheme using symmetric key cryptography and pre-authentication approach to shorten the delay while ensuring high security level for Mobile WiMAX handover. The scheme is proven by BAN logic to achieve the security goals of an authentication scheme. A performance analysis is also carried out to show the effectiveness of this scheme in reducing handover delay and saving computational resources.
17 schema:genre research_article
18 schema:inLanguage en
19 schema:isAccessibleForFree false
20 schema:isPartOf N37322078b4ee4643b0be8105f188ef12
21 N9cddd3dd4cdd4d12a20182ec24571f2f
22 sg:journal.1133522
23 schema:name A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks
24 schema:pagination 2734-2751
25 schema:productId N58df5df11ac048ab8089cb758be32653
26 Nb31ca96aedb943c4bb2531f3f1c4c1d5
27 Nc53527f631de43d1a7f1104e237ba975
28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031939206
29 https://doi.org/10.1007/s11227-015-1581-y
30 schema:sdDatePublished 2019-04-10T15:03
31 schema:sdLicense https://scigraph.springernature.com/explorer/license/
32 schema:sdPublisher Na5ec1aa9ec7c424e8ab342bb47551590
33 schema:url http://link.springer.com/10.1007%2Fs11227-015-1581-y
34 sgo:license sg:explorer/license/
35 sgo:sdDataset articles
36 rdf:type schema:ScholarlyArticle
37 N37322078b4ee4643b0be8105f188ef12 schema:issueNumber 7
38 rdf:type schema:PublicationIssue
39 N4131c2a4adba4d709afc3b5ee352ab8e rdf:first sg:person.014503457045.37
40 rdf:rest rdf:nil
41 N46a7eb05b818431d9670b11eccc935bb schema:affiliation https://www.grid.ac/institutes/grid.464239.e
42 schema:familyName Feng
43 schema:givenName Yong
44 rdf:type schema:Person
45 N58df5df11ac048ab8089cb758be32653 schema:name dimensions_id
46 schema:value pub.1031939206
47 rdf:type schema:PropertyValue
48 N60b510d04a7e4b7396bb41aa8f2f1dfb schema:affiliation https://www.grid.ac/institutes/grid.59025.3b
49 schema:familyName Zhou
50 schema:givenName Jianhong
51 rdf:type schema:Person
52 N9cddd3dd4cdd4d12a20182ec24571f2f schema:volumeNumber 72
53 rdf:type schema:PublicationVolume
54 N9cef53bce8434bafa164e47a1b880be6 rdf:first N60b510d04a7e4b7396bb41aa8f2f1dfb
55 rdf:rest Nd2cbbd01ac674d0488e3278338c99c56
56 Na5ec1aa9ec7c424e8ab342bb47551590 schema:name Springer Nature - SN SciGraph project
57 rdf:type schema:Organization
58 Nb31ca96aedb943c4bb2531f3f1c4c1d5 schema:name doi
59 schema:value 10.1007/s11227-015-1581-y
60 rdf:type schema:PropertyValue
61 Nc53527f631de43d1a7f1104e237ba975 schema:name readcube_id
62 schema:value 9827027026cb7a7b75e663214c3f05bb6c3a17fdd2c2504c0f8e423ea1d46bae
63 rdf:type schema:PropertyValue
64 Nd2cbbd01ac674d0488e3278338c99c56 rdf:first sg:person.010607646263.42
65 rdf:rest Nf7f1d960d45a43c2a7f7ad25f69081ba
66 Nf7f1d960d45a43c2a7f7ad25f69081ba rdf:first N46a7eb05b818431d9670b11eccc935bb
67 rdf:rest N4131c2a4adba4d709afc3b5ee352ab8e
68 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
69 schema:name Information and Computing Sciences
70 rdf:type schema:DefinedTerm
71 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
72 schema:name Data Format
73 rdf:type schema:DefinedTerm
74 sg:grant.7017680 http://pending.schema.org/fundedItem sg:pub.10.1007/s11227-015-1581-y
75 rdf:type schema:MonetaryGrant
76 sg:journal.1133522 schema:issn 0920-8542
77 1573-0484
78 schema:name The Journal of Supercomputing
79 rdf:type schema:Periodical
80 sg:person.010607646263.42 schema:affiliation https://www.grid.ac/institutes/grid.59025.3b
81 schema:familyName Ma
82 schema:givenName Maode
83 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010607646263.42
84 rdf:type schema:Person
85 sg:person.014503457045.37 schema:affiliation https://www.grid.ac/institutes/grid.59025.3b
86 schema:familyName Nguyen
87 schema:givenName Thuy Ngoc
88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014503457045.37
89 rdf:type schema:Person
90 https://doi.org/10.1109/aina.2015.182 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093844235
91 rdf:type schema:CreativeWork
92 https://doi.org/10.1109/csnt.2014.140 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094921690
93 rdf:type schema:CreativeWork
94 https://doi.org/10.1109/glocom.2008.ecp.394 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094188662
95 rdf:type schema:CreativeWork
96 https://doi.org/10.1109/iccct.2014.7001481 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094776765
97 rdf:type schema:CreativeWork
98 https://doi.org/10.1109/iccubea.2015.43 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095603422
99 rdf:type schema:CreativeWork
100 https://doi.org/10.1109/securecomm.2005.58 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093852697
101 rdf:type schema:CreativeWork
102 https://doi.org/10.1109/tencon.2007.4428890 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094892464
103 rdf:type schema:CreativeWork
104 https://doi.org/10.1109/tvt.2015.2394371 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061822810
105 rdf:type schema:CreativeWork
106 https://doi.org/10.1109/twc.2012.032712.110659 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061828155
107 rdf:type schema:CreativeWork
108 https://doi.org/10.1145/77648.77649 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028687810
109 rdf:type schema:CreativeWork
110 https://www.grid.ac/institutes/grid.464239.e schema:alternateName Chengdu Institute of Information Technology (China)
111 schema:name Chengdu Information Technology of Chinese Academy of Science Co. Ltd, Chengdu, China
112 rdf:type schema:Organization
113 https://www.grid.ac/institutes/grid.59025.3b schema:alternateName Nanyang Technological University
114 schema:name Chengdu Information Technology of Chinese Academy of Science Co. Ltd, Chengdu, China
115 School of Electrical and Electronics Engineering, Nanyang Technological University, Singapore, Singapore
116 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...