Ying Liu

Work place: Beijing Jiaotong University/National Engineering Laboratory for Next Generation Internet Interconnection Devices, Beijing, China

E-mail: yliu@bjtu.edu.cn

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Information Security, Network Architecture, Network Security, Data Structures and Algorithms

Biography

Ying Liu received the B.S. and M.S. degrees from Beijing Jiaotong University in 2000 and 2003, respectively. She is currently working toward the PhD degree in communication and information systems at Beijing Jiaotong University, where she is a lecturer with the School of Electronic and Information Engineering. Her research interests include Internet routing, network monitoring and network security.

Author Articles
AuMID: An Authentication Mechanism based on Identity Tag under Future Internet Architecture

By Ming Wan Ying Liu Hongke Zhang

DOI: https://doi.org/10.5815/ijitcs.2010.02.08, Pub. Date: 8 Dec. 2010

It has been commonly recognized that the current Internet faces serious security and scaling problems. To address these problems, the architecture of ID/locator separation is the focus of future Internet development.
However, the relevant authentication mechanism has not been proposed under this architecture. In this paper, we advance a new authentication mechanism called AuMID under ID/locator separation architecture, and describe the detailed procedures of access authentication and handoff authentication, and simultaneously give the deployment of authentication centers. Besides, AuMID uniquely introduces the Identity Tag which represents the terminal’s identity information to implement the sustainable authentication for the terminal. This mechanism adopts the challenge-response approach and achieves the double-way authentication between the terminal and access network. At the same time, by the use of Identify Tag AuMID successfully guarantees the authenticity of the source under ID/locator separation architecture. In conclusion, this paper gives a qualitative analysis for the scalability and security of this AuMID and an evaluation of handoff authentication delay.

[...] Read more.
Other Articles