LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature

被引:4
|
作者
Gao, Tianhan [1 ]
Guo, Nan [2 ]
Yim, Kangbin [3 ]
机构
[1] Northeastern Univ, Software Coll, Shenyang 110819, Peoples R China
[2] Northeastern Univ, Informat Sci & Engn Coll, Shenyang 110819, Peoples R China
[3] Soonchunhyang Univ, Dept Informat Secur Engn, Asan 336745, South Korea
关键词
Wireless mesh network; Multi-operator; Mutual authentication; Identity-based proxy signature; Ticket; ARCHITECTURE; ENCRYPTION;
D O I
10.1016/j.mcm.2012.11.030
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Aiming at establishing secure access and communications for a multi-operator wireless mesh network (WMN), this paper proposes a localized efficient authentication scheme (LEAS) under a broker-based hierarchical security architecture and trust model. Mutual authentication is achieved directly between mesh client and access mesh router through a ticket which is equipped with an identity-based proxy signature. Fast authentication for different roaming scenarios is supported by using HMAC operations on both the mesh client side and mesh router side. As a byproduct, key agreement among network entities is also implemented to protect the subsequent communications after authentication. Our performance and security analysis demonstrate that LEAS is efficient and resilient to various kinds of attacks. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1427 / 1440
页数:14
相关论文
共 50 条
  • [41] An improved efficient identity-based proxy signature in the standard model
    Hu, XiaoMing
    Wang, Jian
    Xu, HuaJie
    Yang, YinChun
    Xu, XiaoLin
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (01) : 22 - 38
  • [42] Efficient pairing-free provably secure identity-based proxy blind signature scheme
    Tan, Zuowen
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 593 - 601
  • [43] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [44] An improved efficient identity-based quantum signature scheme
    Huang, Yongfei
    Xu, Guangxia
    Song, Xiaoling
    QUANTUM INFORMATION PROCESSING, 2022, 22 (01)
  • [45] A secure and efficient identity-based quantum signature scheme
    Liu, Bai
    Zhu, Pengda
    Guo, Kuikui
    AIP ADVANCES, 2024, 14 (06)
  • [46] Identity-based proxy blind signature scheme on lattice in high-speed network environment
    Yang, Mengjiao
    Ke, Dongmei
    Li, Fengyin
    JOURNAL OF HIGH SPEED NETWORKS, 2023, 29 (04) : 337 - 341
  • [47] An improved efficient identity-based quantum signature scheme
    Yongfei Huang
    Guangxia Xu
    Xiaoling Song
    Quantum Information Processing, 22
  • [48] An Efficient Identity-Based Signature Scheme for Vehicular Communications
    Zhang, Yaling
    Yang, Liang
    Wang, Shangping
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 326 - 330
  • [49] Efficient Unrestricted Identity-Based Aggregate Signature Scheme
    Yuan, Yumin
    Zhan, Qian
    Huang, Hua
    PLOS ONE, 2014, 9 (10):
  • [50] Cryptanalysis of a secure and efficient identity-based signature scheme
    Yu, Yong
    Ni, Jian-Bing
    Xu, Chun-Xiang
    Niu, Lei
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (05): : 1125 - 1131