[Show abstract][Hide abstract] ABSTRACT: In this paper, we propose a handover authentication mechanism, called handover key management and authentication scheme (HaKMA),
which as a three-layer authentication architecture is a new version of our previous work Diffie-Hellman-PKDS-based authentication
method (DiHam for short) by improving its key generation flow and adding a handover authentication scheme to respectively
speed up handover process and increase the security level for mobile stations (MS). AAA server supported authentication is
also enhanced by involving an improved extensible authentication protocol (EAP). According to the analyses of this study,
the HaKMA is more secure than the compared schemes, including the PKMv2 and DiHam.
International Conference on Multidisciplinary Research and Practice for Business, Enterprise and Health Information Systems - MURPBES 2011 / Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings; 01/2011
[Show abstract][Hide abstract] ABSTRACT: Recently, wireless communication has been popularly used in our everyday life. However, its secu-rity is a crucial work since messages are broadcasted via wireless channels through which hackers can intercept the massages and then know the contents of the messages. That is why security has been one of the most important issues in wireless communication studies. Encrypting messages to ciphertext is one of the methods to solve this problem. But, it also causes another problem, i.e., how to safely and confidentially encrypt and deliver security keys so that hackers have to spend a very long time before they can decrypt the ciphertext. In this paper, we proposed an authentication ap-proach, called the secure point-to-point encryption method (SePem for short), which integrates RSA, Diffie-Hellman PKDS and a stream cipher technique to provide users with a highly secure point-to-point wireless network without requiring a CA. According to the security analysis of this study, the SePem can efficiently and securely protect a wireless environment. Our simulation results show that the performance of this method can meet users' communication needs.
[Show abstract][Hide abstract] ABSTRACT: In broadband wireless technology, due to having many salient advantages, such as high data rates, quality of service, scalability, security, mobility, etc., LTE-A currently has been one of the trends of wireless system development. This system provides several sophisticated authentication and encryption techniques to enhance its system security. However, LTE-A still suffers from various attacks, like eavesdropping and replay attacks. Therefore, in this paper, we propose a novel security scheme, called the security system for a 4G
environment (Se4GE for short), which as an LTE-A-based system integrates the RSA and Diffie–Hellman algorithms to solve some of LTE-A’s security drawbacks where LTE-A stands for LTE-Advance which is a 4G system. The Se4GE is an end-to-end ciphertext transfer mechanism which dynamically changes encryption keys to enforce the security of data transmission in an LTE-A system. The Se4GE also produces several logically connected random keys, called the intelligent protection-key chain, which invokes two encryption/decryption techniques to provide users with broader demands for security services. The analytical results show that the Se4GE has higher security level than that of an LTE-A system.
The Journal of Supercomputing 03/2014; 67(3). · 0.84 Impact Factor
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.