An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment

被引:4
|
作者
Ma, Zhuo [1 ]
Ma, Jianfeng [2 ]
Moon, SangJae [3 ]
Li, Xinghua [1 ]
机构
[1] Xidian Univ, Sch Comp Sci, Xian 710071, Peoples R China
[2] Xidian Univ, Minist Educ, Key Lab Comp Networks & Informat Secur, Xian 710071, Peoples R China
[3] Kyungpook Natl Univ, Mobile Network Secur Technol Res Ctr, Daeyu 702701, South Korea
来源
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
WLAN mesh; trusted network connect; universally composable security;
D O I
10.1587/transinf.E93.D.430
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trusted Network Connect provides the functionality of the platform authentication and integrity verification which is crucial for enhancing the security of authentication protocols. However, applying this functionality directly to concrete authentications is susceptible to unknown attacks and efficiency degradation. In this paper, we propose TWMAP, a novel authentication protocol for WLAN Mesh networks in a trusted environment which completed the platform authentication and integrity verification during the user authentication. And, the Schnorr asymmetric signature scheme is utilized to reduce the overhead of the client. The security properties of the new protocol are examined using the Universally Composable Security model. The analytic comparisons and simulation results show that the new protocol is very efficient in both computing and communication costs.
引用
收藏
页码:430 / 437
页数:8
相关论文
共 50 条
  • [1] A Trusted Network Access Protocol for WLAN Mesh Networks
    Xiao, Yuelei
    Wang, Yumin
    Pang, Liaojun
    Tan, Shichong
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (12): : 2865 - 2869
  • [2] Provably Secure Trusted Access Protocol for WLAN Mesh Networks
    Ma, Zhuo
    Ma, Jianfeng
    Shen, Yulong
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 43 - +
  • [3] An access authentication protocol for trusted handoff in wireless mesh networks
    Xiao, Peng
    He, Jingsha
    Fu, Yingfang
    [J]. COMPUTER STANDARDS & INTERFACES, 2014, 36 (03) : 480 - 488
  • [4] An Efficient Authentication Protocol for Wireless Mesh Networks
    Zhai, Peng
    He, Jingsha
    Zhu, Nafei
    He, Peng
    Liang, Yao
    [J]. JOURNAL OF WEB ENGINEERING, 2020, 19 (7-8): : 1193 - 1212
  • [5] An efficient authentication protocol for integrating WLAN and cellular networks
    Tseng, YM
    Yang, CC
    Su, JH
    [J]. 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 416 - 420
  • [6] Research of Trusted Authentication in Wireless Mesh Networks
    Zhai Peng
    Cao Manman
    Zhang Liping
    Han Ke
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 277 - 280
  • [7] An Efficient WLAN Initial Access Authentication Protocol
    Li, Xinghua
    Ma, Jianfeng
    Shen Yulong
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1035 - 1040
  • [8] A new trusted roaming protocol in wireless mesh networks
    Xiao, Peng
    He, Jingsha
    Chen, Yunli
    Fu, Yingfang
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2013, 14 (02) : 109 - 119
  • [9] An Efficient Authentication Protocol of WLAN and its Security Proof
    Zhang, Haojun
    Chen, Li
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1076 - +
  • [10] FLAP: An Efficient WLAN Initial Access Authentication Protocol
    Li, Xinghua
    Bao, Fenye
    Li, Shuxin
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) : 488 - 497