A novel ID-based multi-domain handover protocol for mesh points in WMNs

被引:2
作者
Zhang, Xue [1 ]
Li, Guangsong [1 ]
Han, Wenbao [1 ]
Ji, Huifang [1 ]
机构
[1] Informat Engn Univ, State Key Lab Math Engn & Adv Comp, Zhengzhou 450002, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2015年 / 9卷 / 07期
基金
中国国家自然科学基金;
关键词
wireless mesh networks; handover; ID-based; multi-domain; signcryption; AUTHENTICATION; SIGNCRYPTION;
D O I
10.3837/tiis.2015.07.10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless mesh networks (WMNs) provide an efficient and flexible method to the field of wireless networking, but also bring many security issues. A mesh point may lose all of its available links during its movement. Thus, the mesh point needs to handover to a new mesh point in order to obtain access to the network again. For multi-domain WMNs, we proposed a new ID-based signcryption scheme and accordingly present a novel ID-based handover protocol for mesh points. The mutual authentication and key establishment of two mesh points which belong to different trust domains can be achieved by using a single one-round message exchange during the authentication phase. The authentication server is not involved in our handover authentication protocol so that mutual authentication can be completed directly by the mesh points. Meanwhile, the data transmitted between the two mesh points can be carried by the authentication messages. Moreover, there are no restrictions on the PKG system parameters in our proposed multi-domain ID-based signcryption scheme so our handover scheme can be easily applied to real WMNs circumstances. Security of the signcryption scheme is proved in the random oracle model. It shows that our protocol satisfies the basic security requirements and is resistant to existing attacks based on the security of the signcryption. The analysis of the performance demonstrates that the protocol is efficient and suitable for the multi-domain WMNs environment.
引用
收藏
页码:2512 / 2529
页数:18
相关论文
共 20 条
  • [1] Akyildiz I.F., 2009, Wireless Mesh Networks
  • [2] [Anonymous], 2002, IACR Cryptol. ePrintArch.
  • [3] [Anonymous], 80211S IEEE
  • [4] [Anonymous], 2004, 80211I IEEE
  • [5] Bing He, 2010, 2010 IEEE 7th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2010), P71, DOI 10.1109/MASS.2010.5663966
  • [6] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [7] Braskich T., 2007, 80211070564R2 IEEE
  • [8] LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature
    Gao, Tianhan
    Guo, Nan
    Yim, Kangbin
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) : 1427 - 1440
  • [9] Efficient identity based signature schemes based on pairings
    Hess, F
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 310 - 324
  • [10] *IEEE, 2001, 80211X IEEE