LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature

被引:4
|
作者
Gao, Tianhan [1 ]
Guo, Nan [2 ]
Yim, Kangbin [3 ]
机构
[1] Northeastern Univ, Software Coll, Shenyang 110819, Peoples R China
[2] Northeastern Univ, Informat Sci & Engn Coll, Shenyang 110819, Peoples R China
[3] Soonchunhyang Univ, Dept Informat Secur Engn, Asan 336745, South Korea
关键词
Wireless mesh network; Multi-operator; Mutual authentication; Identity-based proxy signature; Ticket; ARCHITECTURE; ENCRYPTION;
D O I
10.1016/j.mcm.2012.11.030
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Aiming at establishing secure access and communications for a multi-operator wireless mesh network (WMN), this paper proposes a localized efficient authentication scheme (LEAS) under a broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between mesh client and access mesh router through a ticket which is equipped with an identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both the mesh client side and mesh router side. As a byproduct, key agreement among network entities is also implemented to protect the subsequent communications after authentication. Our performance and security analysis demonstrate that LEAS is efficient and resilient to various kinds of attacks. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1427 / 1440
页数:14
相关论文
共 50 条
  • [31] Efficient online/offline identity-based signature for wireless sensor network
    Liu, Joseph K.
    Baek, Joonsang
    Zhou, Jianying
    Yang, Yanjiang
    Wong, Jun Wen
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (04) : 287 - 296
  • [32] On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
    Sun, Ying
    Yu, Yong
    Zhang, Xiaosong
    Chai, Jiwen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (03) : 721 - 723
  • [33] An identity-based multiple grade anonymous proxy signature scheme
    Cui, Shenjun
    Wen, Fengtong
    Journal of Computational Information Systems, 2010, 6 (07): : 2441 - 2447
  • [34] Efficient online/offline identity-based signature for wireless sensor network
    Joseph K. Liu
    Joonsang Baek
    Jianying Zhou
    Yanjiang Yang
    Jun Wen Wong
    International Journal of Information Security, 2010, 9 : 287 - 296
  • [35] Identity-based threshold proxy signature scheme with known signers
    Bao, Haiyong
    Cao, Zhenfu
    Wang, Shengbao
    THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2006, 3959 : 538 - 546
  • [37] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [38] Secure and efficient identity-based proxy multi-signature using cubic residues
    Chang, Chin-Chen (alan3c@gmail.com), 1600, Femto Technique Co., Ltd. (18):
  • [39] Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model
    He, Debiao
    Zhang, Mingwu
    Xu, Baowen
    COMPUTER JOURNAL, 2015, 58 (10): : 2507 - 2508
  • [40] An Efficient Identity-Based Proxy Blind Signature for Semioffline Services
    Zhu, Hongfei
    Tan, Yu-an
    Zhu, Liehuang
    Zhang, Quanxin
    Li, Yuanzhang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,