This paper proposes an Authentication Interworking Protocol (AIP) based on IEEE 802.21 Medi Independent Handover (MIH) in the heterogeneous networks. The proposed AIP with the RSA-based proxy signature reduces han...This paper proposes an Authentication Interworking Protocol (AIP) based on IEEE 802.21 Medi Independent Handover (MIH) in the heterogeneous networks. The proposed AIP with the RSA-based proxy signature reduces handover delay time and communication message overhead when the mobile node moves between the heterogeneous networks. It defines new AlP Type Length Value (AlP TLV) in MIH frame format and uses the MIH Information Server (MIHIS) for issuing signature. The MIHIS can generate a signature on behalf of the AAA server and then the signature can he used by mobile node for a pre-authentication. For low handover delay, the proposed AIP performs pre-authentication processes with MIP protocol before layer 2 handover. Also, this paper analyses the performance of the handover and compares with the non-secure MIH.展开更多
基金supported by the Korea Science and Engineering Foundation(KOSEF)grant funded by the Korea government(MEST)(No.2010-0000100)the Ubiquitous Computing and Network(UCN)project,knowledge and economy frontier R&D program of the Ministry of Knowledge Economy(MKE)in Korea and a result of subproject10C2-C1-20S
文摘This paper proposes an Authentication Interworking Protocol (AIP) based on IEEE 802.21 Medi Independent Handover (MIH) in the heterogeneous networks. The proposed AIP with the RSA-based proxy signature reduces handover delay time and communication message overhead when the mobile node moves between the heterogeneous networks. It defines new AlP Type Length Value (AlP TLV) in MIH frame format and uses the MIH Information Server (MIHIS) for issuing signature. The MIHIS can generate a signature on behalf of the AAA server and then the signature can he used by mobile node for a pre-authentication. For low handover delay, the proposed AIP performs pre-authentication processes with MIP protocol before layer 2 handover. Also, this paper analyses the performance of the handover and compares with the non-secure MIH.