Design and performance analysis of sensor proxy-AAA authentication scheme based on fast handover and forwarding mode for IP-based internet of things

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, with the development of IoT technology, a wireless sensor network technology capable of real-time management by receiving information wirelessly through various kinds of sensors has been actively developed. Hence, reducing the signaling cost becomes an important issue because most of the sensors are powered by battery only. In addition, since the Internet of objects is open on the Internet in object environments, security issues related to authentication of users accessing wireless networks are very important. AAA technology is the best possible way these days of resolving delay issue when introducing authentication process of mobile switching. However, despite long development in AAA technology, the mobility management in wireless network environment has yet to be researched further. To solve these problems, we propose a Proxy-Authentication Authorization Accounting (Proxy-AAA) authentication scheme. This places the AAA server in the LMA so as to the cost of authentication by means of a short, simple mobile authentication. The proposed method reuses the LMA-based session key in the authentication process when moving within the domain, and reuses the AAA server based session key when moving between domains. The AAA server of the scheme will be deployed on Local Mobility Anchor (LMA), making up for the shortage of simple fast handover authentication and hierarchical authentication, and further reducing the cost of intra-domain authentication.

Cite

CITATION STYLE

APA

Cho, C., Song, B. H., Jeong, J., & Chung, T. M. (2017). Design and performance analysis of sensor proxy-AAA authentication scheme based on fast handover and forwarding mode for IP-based internet of things. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 199, pp. 22–35). Springer Verlag. https://doi.org/10.1007/978-3-319-60717-7_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free