{"id":"https://openalex.org/W1986246904","doi":"https://doi.org/10.1145/2448556.2448662","title":"An enhanced mechanism with cryptographic computation cost reduction in AAA-mobile IP architecture","display_name":"An enhanced mechanism with cryptographic computation cost reduction in AAA-mobile IP architecture","publication_year":2013,"publication_date":"2013-01-17","ids":{"openalex":"https://openalex.org/W1986246904","doi":"https://doi.org/10.1145/2448556.2448662","mag":"1986246904"},"language":"en","primary_location":{"id":"doi:10.1145/2448556.2448662","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2448556.2448662","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051418905","display_name":"Ph\u1ea1m Ng\u1ecdc Thanh","orcid":"https://orcid.org/0000-0002-2647-3258"},"institutions":[{"id":"https://openalex.org/I24062138","display_name":"Konkuk University","ror":"https://ror.org/025h1m602","country_code":"KR","type":"education","lineage":["https://openalex.org/I24062138"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Pham Ngoc Thanh","raw_affiliation_strings":["Konkuk University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Konkuk University, Seoul, South Korea","institution_ids":["https://openalex.org/I24062138"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043239412","display_name":"Keecheon Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I24062138","display_name":"Konkuk University","ror":"https://ror.org/025h1m602","country_code":"KR","type":"education","lineage":["https://openalex.org/I24062138"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Keecheon Kim","raw_affiliation_strings":["Konkuk University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Konkuk University, Seoul, South Korea","institution_ids":["https://openalex.org/I24062138"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051418905"],"corresponding_institution_ids":["https://openalex.org/I24062138"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.06046349,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.7768033742904663},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7446980476379395},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6337868571281433},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6013393402099609},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5634241700172424},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5087009072303772},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5041829347610474},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.4700034260749817},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.46555405855178833},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4312129616737366},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4306914210319519},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.42844146490097046}],"concepts":[{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.7768033742904663},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7446980476379395},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6337868571281433},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6013393402099609},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5634241700172424},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5087009072303772},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5041829347610474},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.4700034260749817},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.46555405855178833},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4312129616737366},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4306914210319519},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.42844146490097046}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2448556.2448662","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2448556.2448662","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G7577578986","display_name":null,"funder_award_id":"2012R1A1A2006002","funder_id":"https://openalex.org/F4320322349","funder_display_name":"Ministry of Education, Science and Technology"}],"funders":[{"id":"https://openalex.org/F4320322349","display_name":"Ministry of Education, Science and Technology","ror":"https://ror.org/01p262204"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W20704503","https://openalex.org/W1509886346","https://openalex.org/W1541983349","https://openalex.org/W1570362927","https://openalex.org/W2036386362","https://openalex.org/W2135217499","https://openalex.org/W4247264254"],"related_works":["https://openalex.org/W103173258","https://openalex.org/W1966405014","https://openalex.org/W125990426","https://openalex.org/W2008183593","https://openalex.org/W1967670435","https://openalex.org/W2763050151","https://openalex.org/W3113081412","https://openalex.org/W2123098853","https://openalex.org/W2100678814","https://openalex.org/W2068394892"],"abstract_inverted_index":{"Efficient":[0],"authentication":[1,109,136],"mechanism":[2,110],"plays":[3],"an":[4],"important":[5],"role":[6],"in":[7,59,111,132,189],"Mobile":[8,21,25],"IP":[9,135],"(MIP),":[10],"it":[11],"does":[12],"not":[13],"only":[14],"provide":[15],"the":[16,41,50,57,80,116,121,149,173,176,181,209],"accurate":[17],"verification":[18],"of":[19,48,52],"genuine":[20],"Node":[22],"(MN)":[23],"and":[24,92,159,164,185,205],"Agents":[26],"(MAs)":[27],"information":[28,77],"by":[29,119],"utilizing":[30],"Authentication":[31],"Server":[32],"e.g.":[33],"Authentication-Authorization-Accounting":[34],"(AAA)":[35],"server,":[36],"but":[37],"also":[38,171],"help":[39],"reduce":[40],"delay":[42],"when":[43],"handover":[44],"occurs.":[45],"For":[46],"sake":[47],"securing":[49],"traffic":[51],"key":[53,63,71,117,182],"exchange":[54],"process":[55,184],"between":[56,157],"entities":[58],"MIP,":[60],"either":[61],"public":[62],"cryptography":[64],"(e.g.":[65],"Diffie-Hellman)":[66],"or":[67],"encryption":[68],"with":[69],"pre-shared":[70],"is":[72],"used":[73,206],"to":[74,97,140,147,202,207],"protect":[75],"sensitive":[76],"flying":[78],"on":[79,100],"air":[81],"from":[82,144],"malicious":[83],"attackers.":[84],"However,":[85],"these":[86,187,197],"heavy":[87,122],"tasks":[88],"cost":[89],"significant":[90],"time":[91],"resource":[93],"consumption,":[94],"what":[95],"need":[96],"be":[98,203],"reduced":[99],"power-constrained":[101],"mobile":[102],"devices.":[103],"This":[104,168],"paper":[105,169],"proposes":[106],"a":[107],"new":[108],"AAA":[112,145,212],"infrastructure":[113],"which":[114],"facilitates":[115],"distribution":[118],"eliminating":[120],"cryptographic":[123],"operations":[124],"as":[125,127],"much":[126],"possible":[128],"(85.71%":[129],"improved).":[130],"Moreover,":[131],"original":[133],"AAA-Mobile":[134],"mechanisms,":[137],"MN":[138,158,163,178,215],"has":[139],"wait":[141],"for":[142,153],"nonce":[143],"server":[146,213],"generate":[148],"Session":[150],"Keys":[151],"(SKs)":[152],"Security":[154],"Associations":[155],"(SAs)":[156],"Home":[160],"Agent":[161,166],"(HA),":[162],"Foreign":[165],"(FA).":[167],"will":[170],"introduce":[172],"method":[174],"how":[175],"unauthenticated":[177],"can":[179],"initiate":[180],"generating":[183],"create":[186],"SKs":[188],"advance.":[190],"Despite":[191],"their":[192],"anonymous":[193],"creator":[194],"i.e.":[195],"MN,":[196],"keys":[198],"are":[199],"absolutely":[200],"able":[201],"trusted":[204],"secure":[208],"channel":[210],"after":[211],"confirms":[214],"credentials.":[216]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
