Ming Wan

Work place: Beijing Jiaotong University/National Engineering Laboratory for Next Generation Internet Interconnection Devices, Beijing, China

E-mail: ming305.bjtu@gmail.com


Research Interests: Computer Architecture and Organization, Information Security, Network Security, Information Systems, Information Retrieval, Information Storage Systems, Multimedia Information System, Data Structures and Algorithms, Information-Theoretic Security


Ming Wan received the BS degree in information and communication engineering from Beijing Jiaotong University (formerly known as Northern Jiaotong University) in July 2007. From September 2007 to now, he is a PhD candidate in National Engineering Laboratory for Next Generation Internet Interconnection Devices of Beijing Jiaotong University. He has published 4 research papers in the areas of identity authentication and network monitoring. His research interests include the areas of architecture of future Internet, network and information security.
Email: ming305.bjtu@gmail.com

Author Articles
AuMID: An Authentication Mechanism based on Identity Tag under Future Internet Architecture

By Ming Wan Ying Liu Hongke Zhang

DOI: https://doi.org/10.5815/ijitcs.2010.02.08, Pub. Date: 8 Dec. 2010

It has been commonly recognized that the current Internet faces serious security and scaling problems. To address these problems, the architecture of ID/locator separation is the focus of future Internet development.
However, the relevant authentication mechanism has not been proposed under this architecture. In this paper, we advance a new authentication mechanism called AuMID under ID/locator separation architecture, and describe the detailed procedures of access authentication and handoff authentication, and simultaneously give the deployment of authentication centers. Besides, AuMID uniquely introduces the Identity Tag which represents the terminal’s identity information to implement the sustainable authentication for the terminal. This mechanism adopts the challenge-response approach and achieves the double-way authentication between the terminal and access network. At the same time, by the use of Identify Tag AuMID successfully guarantees the authenticity of the source under ID/locator separation architecture. In conclusion, this paper gives a qualitative analysis for the scalability and security of this AuMID and an evaluation of handoff authentication delay.

[...] Read more.
Other Articles