Anonymous Authentication Scheme based on Proxy Group Signature for Wireless MESH Network

被引:2
作者
Gao, Tianhan [1 ]
Miao, Qidi [1 ]
Guo, Nan [2 ]
机构
[1] Northeastern Univ, Software Coll, Shenyang, Peoples R China
[2] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
来源
2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS) | 2014年
基金
中国国家自然科学基金;
关键词
WMN; privacy protection; access authentication; proxy group signature;
D O I
10.1109/IMIS.2014.78
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless MESH Network (WMN) has become an important technology and has been widely deployed due to its simplicity, low cost, and flexibility in implementation. WMN is a wireless multi-hop network, therefore the privacy protection is extremely important. This paper proposes an anonymous access authentication scheme based on the proxy group signature. The scheme completely protects user's privacy during authentication. In order to improve the efficiency of our scheme, we further adopt certificate-based signature mechanism to design a highly efficient handover authentication protocol. Finally, we show the security analysis of our scheme.
引用
收藏
页码:533 / 537
页数:5
相关论文
共 11 条
[1]  
[Anonymous], 1991, EUROCRYPT
[2]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[3]  
Kang BG, 2004, LECT NOTES COMPUT SC, V2964, P99
[4]  
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
[5]  
Ru Li, 2009, Proceedings of the 2009 International Conference on Computational Intelligence and Security (CIS 2009), P416, DOI 10.1109/CIS.2009.76
[6]  
SALEM NB, 2006, IEEE WIREL COMMUN, P50
[7]  
Sen J, 2011, WIRELESS MESH NETWOR
[8]  
Shamir A., 1985, WORKSHOP THEORY APPL, V196, P47, DOI [10.1007/3-540-39568-7_5, 10.1007/3-540-39568-75]
[9]  
Wenju L, 2009, WIR COMM NETW MOB CO, P1
[10]  
Whitehead P., 2000, IEEE RAD WIR C RAWCO