An Instant Authentication Scheme in Wireless Mesh Networks

被引:0
|
作者
Wei, Qian [1 ]
He, Jingsha [2 ]
Zhang, Xing [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing, Peoples R China
[2] Beijing Univ Technol, Sch Software Engn, Beijing, Peoples R China
来源
ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2 | 2009年
关键词
instant authentication; wireless Mesh networks; roaming;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication is a basic mechanism for secure roaming in wireless Mesh networks (WMNs). However, existing roaming authentication protocols such as 3G, IEEE 802.1x, etc. cannot meet the requirement for secure and fast network access in response to rapid increase in the size of networks and in the number of users. In this paper, we propose an instant authentication scheme for secure roaming in WMNs in which information exchange between a visited network and the home network is not required for inter-network roaming authentication. To achieve the goal, the security scheme relies on an elaborate design of the public key distribution plan. Furthermore, a user needs to authenticate with the authentication center of the visited network only once on the first visit to the network. Our simulation results show that the proposed scheme performs better in authentication latency as well as in security when compared to some existing roaming authentication methods.
引用
收藏
页码:1025 / +
页数:2
相关论文
共 50 条
  • [31] A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks
    Xu, Lin
    Wen, Mi
    Li, Jinguo
    2015 IEEE CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2015, : 200 - 204
  • [32] Security and authentication scheme for hierarchical wireless sensor networks
    School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China
    不详
    Dongnan Daxue Xuebao, 2008, SUPPL. 1 (243-248): : 243 - 248
  • [33] Privacy-Preserving Authentication Scheme for Wireless Networks
    Hazazi, Manal
    Tian, Yuan
    Al-Rodhaan, Mznah
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [34] AN EFFICIENT SCHEME FOR BROADCAST AUTHENTICATION IN WIRELESS SENSOR NETWORKS
    Zhang, Jianmin
    Liu, Xiande
    Xu, Haifeng
    2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, 2006,
  • [35] A dynamic User Authentication scheme for wireless sensor networks
    Wong, Kirk H. M.
    Zheng, Yuan
    Cao, Jiannong
    Wang, Shengwei
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 244 - +
  • [36] BAS: The Biphase Authentication Scheme for Wireless Sensor Networks
    Riaz, Rabia
    Chung, Tae-Sun
    Rizvi, Sanam Shahla
    Yaqub, Nazish
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [37] Authentication Protocol with Privacy Preservation for Handover in Wireless Mesh Networks
    Roy, Amit Kumar
    Khan, Ajoy Kumar
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 383 - 395
  • [38] A security architecture for attacks detection and authentication in wireless mesh networks
    Parveen Kumar Sharma
    Rajiv Mahajan
    Cluster Computing, 2017, 20 : 2323 - 2332
  • [39] On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks
    Lu, Jian-zhu
    Zhou, Jipeng
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [40] A scheme for authentication and dynamic key exchange in wireless networks
    Blumenthal, U
    Buddhikot, MM
    Garay, JA
    Miller, SC
    Patel, S
    Salgarelli, L
    Stanley, D
    BELL LABS TECHNICAL JOURNAL, 2002, 7 (02) : 37 - 48