Hongke Zhang

Work place: Beijing Jiaotong University/National Engineering Laboratory for Next Generation Internet Interconnection Devices, Beijing, China

E-mail: hkzhang@bjtu.edu.cn


Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Computer Networks, Information Security, Information Systems, Information Theory


Hongke Zhang received the MS and PhD degrees in electrical and communication systems from the University of Electronic Science and Technology of China (formerly known as Chengdu Institute of Radio Engineering) in 1988 and 1992, respectively. From September 1992 to June 1994, he was a postdoc research associate at Beijing Jiaotong University (formerly known as Northern Jiaotong University). In July 1994, he joined Beijing Jiaotong University, where he is a professor. He has published more than 100 research papers in the areas of communications, computer networks, and information theory. He is the author of eight books written in Chinese and the holder of more than 30 patents. He received the Zan Tianyou Science and Technology Improvement Award in 2001, the Mao Yisheng Science and Technology Improvement Award in 2003, the first class Science and Technology Improvement Award of the Beijing government in 2005, and other various awards. He is now the chief scientist of a National Basic Research Program (“973” program).
Email: hkzhang@bjtu.edu.cn

Author Articles
AuMID: An Authentication Mechanism based on Identity Tag under Future Internet Architecture

By Ming Wan Ying Liu Hongke Zhang

DOI: https://doi.org/10.5815/ijitcs.2010.02.08, Pub. Date: 8 Dec. 2010

It has been commonly recognized that the current Internet faces serious security and scaling problems. To address these problems, the architecture of ID/locator separation is the focus of future Internet development.
However, the relevant authentication mechanism has not been proposed under this architecture. In this paper, we advance a new authentication mechanism called AuMID under ID/locator separation architecture, and describe the detailed procedures of access authentication and handoff authentication, and simultaneously give the deployment of authentication centers. Besides, AuMID uniquely introduces the Identity Tag which represents the terminal’s identity information to implement the sustainable authentication for the terminal. This mechanism adopts the challenge-response approach and achieves the double-way authentication between the terminal and access network. At the same time, by the use of Identify Tag AuMID successfully guarantees the authenticity of the source under ID/locator separation architecture. In conclusion, this paper gives a qualitative analysis for the scalability and security of this AuMID and an evaluation of handoff authentication delay.

[...] Read more.
Other Articles