{"id":"https://openalex.org/W2125903421","doi":"https://doi.org/10.1109/wcnc.2009.4917587","title":"An Innovative SIP Security Mechanism with Seamless Mobility Support","display_name":"An Innovative SIP Security Mechanism with Seamless Mobility Support","publication_year":2009,"publication_date":"2009-04-01","ids":{"openalex":"https://openalex.org/W2125903421","doi":"https://doi.org/10.1109/wcnc.2009.4917587","mag":"2125903421"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc.2009.4917587","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2009.4917587","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE Wireless Communications and Networking Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100425210","display_name":"Liang Zhang","orcid":"https://orcid.org/0000-0002-4588-8176"},"institutions":[{"id":"https://openalex.org/I4210120159","display_name":"SoftBank Group (Japan)","ror":"https://ror.org/02ew2ks20","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210120159"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Liang Zhang","raw_affiliation_strings":["Wireless System Research Center, Research Division, Softbank Mobile Corporation, Japan","Wireless System Research Center, Softbank Mobile Corp"],"affiliations":[{"raw_affiliation_string":"Wireless System Research Center, Research Division, Softbank Mobile Corporation, Japan","institution_ids":["https://openalex.org/I4210120159"]},{"raw_affiliation_string":"Wireless System Research Center, Softbank Mobile Corp","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028662915","display_name":"Haruya Miyajima","orcid":null},"institutions":[{"id":"https://openalex.org/I4210120159","display_name":"SoftBank Group (Japan)","ror":"https://ror.org/02ew2ks20","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210120159"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Haruya Miyajima","raw_affiliation_strings":["Wireless System Research Center, Research Division, Softbank Mobile Corporation, Japan","Wireless System Research Center, Softbank Mobile Corp"],"affiliations":[{"raw_affiliation_string":"Wireless System Research Center, Research Division, Softbank Mobile Corporation, Japan","institution_ids":["https://openalex.org/I4210120159"]},{"raw_affiliation_string":"Wireless System Research Center, Softbank Mobile Corp","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005778977","display_name":"Hideki Hayashi","orcid":"https://orcid.org/0000-0003-4585-6542"},"institutions":[{"id":"https://openalex.org/I4210120159","display_name":"SoftBank Group (Japan)","ror":"https://ror.org/02ew2ks20","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210120159"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideki Hayashi","raw_affiliation_strings":["Wireless System Research Center, Research Division, Softbank Mobile Corporation, Japan","Wireless System Research Center, Softbank Mobile Corp"],"affiliations":[{"raw_affiliation_string":"Wireless System Research Center, Research Division, Softbank Mobile Corporation, Japan","institution_ids":["https://openalex.org/I4210120159"]},{"raw_affiliation_string":"Wireless System Research Center, Softbank Mobile Corp","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100425210"],"corresponding_institution_ids":["https://openalex.org/I4210120159"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14486582,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7607485055923462},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7521910667419434},{"id":"https://openalex.org/keywords/session-initiation-protocol","display_name":"Session Initiation Protocol","score":0.6282131671905518},{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.5679752230644226},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5250812768936157},{"id":"https://openalex.org/keywords/mobile-ip","display_name":"Mobile IP","score":0.5181485414505005},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5133630633354187},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.48045915365219116},{"id":"https://openalex.org/keywords/ip-tunnel","display_name":"IP tunnel","score":0.4511397182941437},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.4448419511318207},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.23918011784553528},{"id":"https://openalex.org/keywords/internet-protocol-suite","display_name":"Internet protocol suite","score":0.20784035325050354},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.14735642075538635},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1232006847858429},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0686962902545929}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7607485055923462},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7521910667419434},{"id":"https://openalex.org/C41878487","wikidata":"https://www.wikidata.org/wiki/Q191018","display_name":"Session Initiation Protocol","level":3,"score":0.6282131671905518},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.5679752230644226},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5250812768936157},{"id":"https://openalex.org/C82203111","wikidata":"https://www.wikidata.org/wiki/Q205936","display_name":"Mobile IP","level":3,"score":0.5181485414505005},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5133630633354187},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.48045915365219116},{"id":"https://openalex.org/C10790986","wikidata":"https://www.wikidata.org/wiki/Q442343","display_name":"IP tunnel","level":4,"score":0.4511397182941437},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.4448419511318207},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.23918011784553528},{"id":"https://openalex.org/C65567647","wikidata":"https://www.wikidata.org/wiki/Q81414","display_name":"Internet protocol suite","level":3,"score":0.20784035325050354},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.14735642075538635},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1232006847858429},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0686962902545929}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc.2009.4917587","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2009.4917587","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE Wireless Communications and Networking Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320325628","display_name":"Ministry of Internal Affairs and Communications","ror":"https://ror.org/00vs1pz50"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W53577213","https://openalex.org/W1497910606","https://openalex.org/W1558317064","https://openalex.org/W1635678085","https://openalex.org/W1733713784","https://openalex.org/W1949661937","https://openalex.org/W2097042314","https://openalex.org/W2097725665","https://openalex.org/W2099040451","https://openalex.org/W2107912455","https://openalex.org/W2118935932","https://openalex.org/W2140471436","https://openalex.org/W2146316822","https://openalex.org/W2157356152","https://openalex.org/W4232271737","https://openalex.org/W4242138061","https://openalex.org/W6633539272"],"related_works":["https://openalex.org/W2503206547","https://openalex.org/W1493827274","https://openalex.org/W2387784916","https://openalex.org/W2351467704","https://openalex.org/W585605883","https://openalex.org/W24852621","https://openalex.org/W2369580193","https://openalex.org/W2086270974","https://openalex.org/W2123125259","https://openalex.org/W2118287095"],"abstract_inverted_index":{"With":[0],"the":[1,6,11,24,72,85,106,143,149,181,192],"evolution":[2],"and":[3,10,16,26,43,48,92,99,105,113,130,186,203],"proliferation":[4],"of":[5,75,108,145,151,198],"All-IP":[7],"core":[8],"network":[9,177],"mobile":[12,68,152],"access":[13,156],"network,":[14],"more":[15,17],"legacy":[18],"services":[19],"are":[20,119],"being":[21],"transferred":[22],"to":[23,82,183],"converged":[25],"unified":[27],"IP-based":[28],"platform.":[29],"For":[30],"this":[31],"transfer,":[32],"SIP":[33,52,76,97,122,128,164,169,193],"(Session":[34],"Initial":[35],"Protocol)":[36],"has":[37],"been":[38],"adopted":[39],"by":[40],"IETF,":[41],"ETSI,":[42],"3GPP":[44],"for":[45],"creating,":[46],"modifying,":[47],"terminating":[49],"multimedia":[50],"sessions.":[51],"with":[53,171],"application-level":[54],"mobility":[55,146,173,201],"support":[56,147,174],"can":[57,126],"replace":[58],"MIP":[59],"(mobile":[60],"IP)":[61],"since":[62],"it":[63,79,189],"provides":[64],"a":[65],"FMC":[66],"(fixed":[67],"convergence)":[69],"solution.":[70],"Taking":[71],"important":[73],"role":[74],"into":[77],"consideration,":[78],"is":[80],"critical":[81],"fully":[83],"resolve":[84],"security":[86,123,135,139,165,170,194,199],"issues":[87],"including":[88],"service":[89],"authentication,":[90],"confidentiality,":[91],"integrity":[93],"protection":[94],"on":[95],"both":[96],"signaling":[98,129],"data":[100,131],"transmission.":[101],"IPSec":[102],"(IP":[103],"security)":[104,112],"combination":[107],"TLS":[109],"(transport":[110],"layer":[111],"SRTP":[114],"(secure":[115],"real-time":[116],"transport":[117],"protocol)":[118],"two":[120],"representative":[121],"solutions":[124,140],"that":[125,167,188],"protect":[127],"transmission":[132],"from":[133],"various":[134],"attacks.":[136],"However,":[137],"these":[138],"don't":[141],"consider":[142],"issue":[144],"during":[148],"handover":[150],"nodes":[153],"among":[154],"different":[155],"networks.":[157],"This":[158],"paper,":[159],"therefore,":[160],"proposes":[161],"an":[162],"innovative":[163],"mechanism":[166],"realizes":[168],"seamless":[172],"in":[175,196],"heterogeneous":[176],"environments.":[178],"We":[179],"compare":[180],"proposal":[182],"existing":[184],"approaches":[185],"show":[187],"better":[190],"satisfies":[191],"requirements":[195],"terms":[197],"strength,":[200],"support,":[202],"performance.":[204]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
