2010
DOI: 10.1155/2010/249169
|View full text |Cite
|
Sign up to set email alerts
|

SAM: Secure Access of Media Independent Information Service with User Anonymity

Abstract: Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH) services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS) and present a new access authentication scheme with user… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…In interlay mode, both PUs and SUs can transmit concurrently in the same area, without limiting the transfer power of SUs in the PN. In the proposed algorithm PUs and SUs cooperatively share the spectrum provided by PN [3,[10][11][12][13][14][18][19][20].…”
Section: Spectrum Sharing Modes Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…In interlay mode, both PUs and SUs can transmit concurrently in the same area, without limiting the transfer power of SUs in the PN. In the proposed algorithm PUs and SUs cooperatively share the spectrum provided by PN [3,[10][11][12][13][14][18][19][20].…”
Section: Spectrum Sharing Modes Overviewmentioning
confidence: 99%
“…Li, et al [11] proposed the use of MIHSec which uses MSK (Master Session Key) to maintain key hierarchy and removes MIH authentication process in order to reduce handover delay. MIHSec diminishes handoff delay by eliminating IKE/DTLS authentication procedures, confidentiality and message integrity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It provide optimization for inter domain and inter technology handover, and also achieve significant reduction in handover delay for both network and application layer. In [3], a modified version of Kerberos featuring of sequencenumber based service ticket distribution and challenge-response based service access authentication is proposed. It performs Kerberos authentication without relying on time synchronization, which makes authentication between MN and IS more freely.…”
Section: Surveymentioning
confidence: 99%