An anonymous batch handover authentication protocol for big flow wireless mesh networks

被引:9
作者
Wang, Dongcheng [1 ,2 ]
Xu, Li [1 ,2 ]
Wang, Feng [1 ,2 ]
Xu, Qikui [3 ]
机构
[1] Fujian Normal Univ, Sch Math & Informat, Fuzhou, Fujian, Peoples R China
[2] Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
[3] Univ Sydney, Fac Sci, Sydney, NSW, Australia
基金
中国国家自然科学基金;
关键词
Wireless mesh networks; Handover authentication; Privacy-preserving; Bath authentication;
D O I
10.1186/s13638-018-1217-z
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless mesh network (WMN), as a new generation of wireless network technology, has raised increasing concerns in recent years. Due to the strong mobility nature of the clients in WMNs, the handover events frequently occur. Therefore, taking into consideration the openness of the wireless communication channel, the handover authentication protocols for WMNs have to be both efficient and secure, which remains a challenge. In this paper, an anonymous batch handover authentication protocol is proposed using group signature technique to pre-distribute handover keys. Unlike existing protocols based on group signature, the proposed protocol does not involve group signature correlation operations in the handover authentication phase, hence achieving a better performance.
引用
收藏
页数:8
相关论文
共 22 条
[1]   Wireless mesh networks: a survey [J].
Akyildiz, IF ;
Wang, XD ;
Wang, WL .
COMPUTER NETWORKS, 2005, 47 (04) :445-487
[2]   A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks [J].
Chaudhry, Shehzad Ashraf ;
Farash, Mohammad Sabzinejad ;
Naqvi, Husnain ;
Islam, S. K. Hafizul ;
Shon, Taeshik .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 93 (02) :311-335
[3]   Mesh networks for broadband access [J].
Fowler, T .
IEE REVIEW, 2001, 47 (01) :17-22
[4]   An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network [J].
Fu, Anmin ;
Zhang, Yuqing ;
Zhu, Zhenchao ;
Jing, Qi ;
Feng, Jingyu .
COMPUTERS & SECURITY, 2012, 31 (06) :741-749
[5]   Handover Authentication for Mobile Networks: Security and Efficiency Aspects [J].
He, Daojing ;
Chan, Sammy ;
Guizani, Mohsen .
IEEE NETWORK, 2015, 29 (03) :96-103
[6]   Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions [J].
He, Daojing ;
Chen, Chun ;
Chan, Sammy ;
Bu, Jiajun .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (01) :48-53
[7]   Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation [J].
He, Debiao ;
Wang, Ding ;
Xie, Qi ;
Chen, Kefei .
SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)
[8]   An ID-based proxy signature schemes without bilinear pairings [J].
He Debiao ;
Chen Jianhua ;
Hu Jin .
ANNALS OF TELECOMMUNICATIONS, 2011, 66 (11-12) :657-662
[9]   Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks [J].
Islam, S. K. Hafizul ;
Khan, Muhammad Khurram .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (17) :2442-2456
[10]   Efficient authentication for fast handover in wireless mesh networks [J].
Li, Celia ;
Uyen Trang Nguyen ;
Hoang Lan Nguyen ;
Huda, Nurul .
COMPUTERS & SECURITY, 2013, 37 :124-142